Vulnerabilites related to cisco - sf302-08mp_firmware
Vulnerability from fkie_nvd
Published
2018-01-18 06:29
Modified
2024-11-21 03:09
Severity ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62A8CD6-FD0B-4F93-A521-A574470806AA", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E28746B-DDAF-48C3-98D2-6DF02F10402B", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DB647C6-4F49-44B3-B5DC-1CB4B2808809", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D42E184D-0BB9-4632-A910-7223EF5846DC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D9AE8D4-8324-47DE-8A1B-002F04791CF4", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D3EAE27-6D3D-427E-B94B-E65FF60A477F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FA8309E-218A-4EBB-86CB-53568F87AE03", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18D13620-A801-4837-A2D9-D8BB5EC67C8E", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC203EBF-AADC-4536-A3A8-8FAD7EF49F66", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3250E1B1-3478-4089-8D4D-210CF5382396", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C40A90E-B0CC-4713-858A-CE98FA73A59A", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA0176C1-1AC1-4A05-B2C7-E1E4C76A61FD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59267A4D-846E-4E07-9158-7AB7AE6A8754", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCFACA27-EBA0-44A2-ADDB-16701EE476A5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CB0A209-D8D2-48E9-9A83-A4EFFD5EBDC0", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE38A4A5-81FC-4A79-8E8F-F6B288ED2283", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B981B6EB-AAEE-4B4E-86B1-005E11D1DB30", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D496D2D-84AF-47A4-BC5E-607C7E5E6DF6", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A38D74-522F-4001-97C8-8F3D33AC9DC8", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03436FAE-7FBF-4C4A-9EE4-3FD94316ED25", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6961B4DB-F152-43A6-9440-6655BCAD379F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E912AC1-B82E-406B-8480-720223F2FD74", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "438E02A3-D177-4476-80DA-0C95C783B161", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA6AE9A9-61D3-4CE4-B1D3-029734397956", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "142DCA4A-57D6-48C0-ADD9-749E9B8464D1", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7CEC74C-D5FE-45CA-83A1-15F771958993", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46470295-0C82-4D37-A9CE-722CAEED6008", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9162932E-4570-4A6C-8634-1D756EF42C7F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAB16572-975A-473E-8EDA-757BE49CDFCF", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "662D1FD6-5DBB-4DC3-A11E-00AA87A3DF19", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F584E122-98B8-4F6F-92F1-4A6C83C3B934", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6B8D73B-BEF3-4006-9ED4-5C8F98B479D9", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96925BF-73FC-454B-9B00-632EB2A1E1E5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "752F1EF7-FA82-4B8E-B8B6-5939270DB705", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB932882-F8F9-44ED-A673-9A07211D5D7F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "857756BD-B680-43EE-9FDB-F5FD56D7A1AC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28F46707-41BD-4118-933D-1FF48045880E", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37DB9ADA-FCCF-407A-A18D-530FF0815551", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4B89E91-97B0-47EE-BC1E-D0A0098C8C92", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50CB4BA4-E815-4506-A6FE-21B1F41EEEDF", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "6812853E-C083-4841-A467-91130ED194BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "666E6BEC-32C1-4361-AF78-3B5739D38378", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "26A7AB18-C75F-4C63-9132-140EFC46E3C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5803FD62-086B-4316-BDFC-331156C208FD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B70093-E9FE-410A-973E-CE847F08F43A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4015A3F7-5706-40E9-84AD-A81D9205B2CE", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3503F68-CF84-468E-9A40-9F98875DD1C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98827546-CA39-4D4E-9C0F-D3B020BE08D2", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B42742-D701-4AE9-A833-189FB6708FC9", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3E798EF-99B0-4D76-B0F2-6FB9499FCF8B", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A289E57-D99E-4A61-BEE3-91A43F156030", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A415AFE8-B965-45B7-B01F-E3F8F79F8EDD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD23FB5D-9A7F-4A03-A269-A6FE486677D5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61764001-8BCD-4D43-9324-9ADED2F2890C", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A61B9373-76C9-4EFC-B4AF-EB8833310750", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58E2227C-F7C1-424A-B5C5-5C4BDF052521", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2BDD45-5A8B-494A-A9BE-597ABD9B16D7", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8982BA5-8ABD-4235-8D24-90F4C949C583", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDB31016-63A8-4436-A4A5-605E79071A71", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BC8B43A-27FD-4188-9247-11796701FF22", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F611F78-9D39-4970-B43B-D634203D6F2A", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49E144D2-93D7-4F19-8C96-50CB5BA0FBCE", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0D8F03D-511A-42FC-8A89-0C69A4BC0D13", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA114A88-569D-4B50-A908-2CD30EF15D74", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC685D61-7F81-4877-A5A4-E1AE0D2298BC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE87339F-65FC-4BFA-9C5F-6E1E7CA08E2F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D46DE3-626E-407D-A5CA-B05E32F1B6C8", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F600F290-8723-42BE-9E6A-587132ECE8F4", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E85841-5E82-4D66-B7E7-C8AE8A11E1BB", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BCAC9EF-CCF9-4BD2-AADD-A3F48B95B52C", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F214C861-ECCF-4734-9866-E237F5CC5D53", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6791A301-2164-4F44-8B03-91B96BE2CDD0", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03FF785B-6274-4092-9E43-3396F4FE8CAD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C38DF13-3C4A-4CB5-9205-74670FC0C8E5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E523C7-CF2B-430B-829E-D803AA1CDE62", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADCEE83B-369D-4F38-AE97-9ABD11A20DAA", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54B4BEBC-BC5E-4003-9B34-E2A6896F509D", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF964C5-4CA9-4D81-B60E-2BEDEF47E571", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30B99E44-30D9-4AF1-97D5-EA2DCAF6E825", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41879534-43D0-476A-931C-2E8B187D456E", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "975C54C6-B3B0-4C89-9C35-05BBEF6E75C7", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1DC345D-BEB3-409A-803C-D7FE72EFB073", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23C93EF7-4851-4E4E-A600-BAD62254D707", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D89D488C-0582-4338-8848-EEA8DB6AC2DC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00F8E3E4-55D4-43A7-8564-167A2A32DED1", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BA5FC05-98F4-4A8C-91E0-703784F5970C", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55371BC-B4A3-4E56-AE2E-63BD3D5835D2", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7C44E0B-336B-466C-85E0-F92626456CED", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E12126E-E0E3-479D-B5FA-578683C70050", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980." }, { "lang": "es", "value": "Una vulnerabilidad en el framework web de Cisco Small Business Managed Switches Software podr\u00eda permitir que un atacante remoto sin autenticar lleve a cabo un ataque de separaci\u00f3n de respuesta HTTP contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de algunos par\u00e1metros que se pasan al servidor web del sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad convenciendo a un usuario de que acceda a un enlace malicioso o interceptando una petici\u00f3n de usuario e inyectando c\u00f3digo malicioso en la petici\u00f3n. Un exploit con \u00e9xito podr\u00eda permitir que el atacante ejecute c\u00f3digo script arbitrario en el contexto de la interfaz web afectada o que acceda a informaci\u00f3n sensible del navegador. Esta vulnerabilidad afecta a los siguientes productos de Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches y Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980." } ], "id": "CVE-2017-12308", "lastModified": "2024-11-21T03:09:16.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-18T06:29:00.267", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-113" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-04 16:15
Modified
2024-11-21 06:11
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596286D0-AFBA-4F1E-83D8-17B588BB2811", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7567AB0-4FE4-402F-8C8C-70D032FE6860", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F2447F0-9CE0-40A9-AF44-46D7C9BA8D7E", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F81EEF7-B9CD-41F9-BC56-BF70EB7367F5", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "851EFBA8-3D46-4F9C-9F1F-8F56897CF7AD", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "3208F54F-21C5-49EC-8FBF-03BAD10742EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC48CD0-89B4-4D5B-A8F4-F70EB72844E3", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "864E9DE0-4825-41DB-9C3E-63A5C54FBD17", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A60EF4E-A3A3-4E33-9561-BC8259062C2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1627EB2D-1C3D-493C-9888-84D2915E4131", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "98523586-0F3A-4B62-A972-8E9BA4F0DC4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF628BD-B574-471C-8F84-E1361F513731", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CD3BA54-85D9-4688-8B90-612F96D452A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45674B9A-59EC-49FC-A6F8-662A41FEE1F3", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C4D538A-2E11-49A3-9591-1826D496123E", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B23C961-4B85-4DCC-A144-654B9B51ADBA", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAE9706-8B37-4231-B4D4-CA6F527446E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25B48B3-2840-49FC-941C-2DABE5A05D13", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DFEB361-1986-4522-BC23-06140F8D2625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5A7D0F8-6A59-48AB-843E-90B470DCF208", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDC341E-FA7D-4B90-A5AB-E41822E16385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41801033-2A75-4B63-8F72-3F328AEB78E8", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C835D1DE-A639-4CB0-947B-988C89ABED5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE521320-04D4-4246-B183-F09E34A39812", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5D8296-7B6E-4880-8C5F-D7293118CE5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C554DFB-9DE2-4DE1-B27E-87BDA9F16F83", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F6551D-9188-44C6-8101-306D8077C0BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A13F25D-2A7B-4057-866F-2C24164F589B", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27D4259-24AA-4F4F-AC82-53D8BFAA303A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D294C12-5D11-457F-9927-712F6FBB0A0F", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AFF713-460E-4473-B3AD-7E60810170B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55998FC0-29BF-47A3-8E15-76D7352089B6", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D38AC3-6868-45F0-BCEB-ED27496B57B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D61CB3A5-E5F7-492C-86C2-2EE02BE7CC74", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E11EB8-0F0B-4F13-82FF-5CC0687DAB93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "479CB74C-9849-4C18-9F29-A2CCEC13F76E", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC43002-020B-4B56-AD72-E5244DC617DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1390A51-B6D6-4C82-A3AF-6ACC5D227AE7", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-8mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2269BC4-848A-4919-AC8E-4598FF56FCE2", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-8mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED48771-0D53-45B0-BBC2-53CCD36799FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96D830E6-9393-4470-89E7-8FF9A309B306", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf352-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6657640-B1C5-4269-931F-10BBD3828237", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf352-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F35180C-09F4-4819-B86B-F0D47BF19C0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf352-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54E36B87-80D8-4605-B44C-865F6C8C2CFA", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf352-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0609DA-22DD-4427-8CFD-B6B92194F948", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf352-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C34FCD5B-186F-41C8-9526-891654E09AE7", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf352-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "454941C5-6D05-4A8E-8FA3-5677382A5A4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-8pd_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F184214-69DB-4A12-8B8C-E952F9D36100", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-8pd:-:*:*:*:*:*:*:*", "matchCriteriaId": "65DB4BB4-FC16-4624-BE24-C8044FD109E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B36D4D29-74AA-464A-B356-D000269A8299", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9713CB27-EC12-4AF4-88C5-5859EA1A82FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2DC60-7D54-4741-BA0B-765EEC302C6A", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AE1BFE0-6B3C-4F57-85A4-86E58F2EBBA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61B94B82-3864-4D9E-9FCB-B55CB0F51952", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF440F87-57D0-43F1-B5C0-7D944B5093D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "909B2F3E-C476-4E0F-8386-7AE3AD0451F1", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE95C121-A77E-4440-9051-C178927EC671", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3B58C94-2D1C-4C25-9B94-50FF7633D976", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "80D91695-7548-4498-8100-B7793CD8DB25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "001982FC-9BB5-42F7-BA7F-23D23BF88C0F", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "4853BDD7-CBC7-48CB-9AAA-63323832B715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FC8D42E-7971-4DE2-87C1-4C6A1EF20DCD", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "88804D67-943D-4563-9225-F45092053DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "654EDBEB-904D-4C44-87B5-46D06DFFB167", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "367BBC95-D9F9-4E12-8F73-83019FD728E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "557FED4C-060F-45A5-83BF-DB627E685822", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9369467-F70F-41DE-B231-5B0CECD44E9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB81269-094B-4350-A5ED-816A2EB9B9D0", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9F021AC-9B57-48CE-AC46-6B542FAC0A9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACEB47C-EB6D-4698-8BE1-A22E7F2504EF", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACEFF0F7-E3FE-4752-B936-BC353CB3EA23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2D45340-A737-46B1-9FF0-9BE1E586BB7F", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F321BAE0-1207-4D7D-9F14-5DBFCE0EEA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38F133EA-2150-44FC-A827-589FDF5A920D", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E131125-0F14-49D4-ACF3-D6E33E969422", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-8pmd_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A78A6530-BDDB-4C13-8C23-1630A5A16B1F", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-8pmd:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CF7C1FF-A6DA-489B-8C34-13EE28D154AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-12pmv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DFBA8CB-7380-4ED3-806C-9DEAFC673B1E", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-12pmv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA28B28-325F-42C9-AD1F-D6D8606DBA76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABB3F95E-36D4-4E8B-A08A-79A6A81335EC", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4E8C2F1-6075-482D-915E-E39156585638", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "546D6ABD-7344-425E-8271-F09288F7EBFD", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24pd_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A5151F-2E08-4BD7-A52F-3E557BD71722", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24pd:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA2C7F9A-72C9-4B3B-A6DB-712D8D9A52AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24pv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91E66A1C-0AE7-459D-ADDE-749C63B652F5", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24pv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BAF0D4F-5E2C-44FA-A01C-C1E79836D315", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F07E3B6B-AFD6-4AA3-97CA-032093E62A48", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB99488-B94D-47EC-B4B5-AAC1EAAC8E68", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB88198A-E2F7-4153-8F08-728446B3624D", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48pv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD3FF7C0-44EC-4A66-A64D-4D39F79121E0", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48pv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7C7B87F-644A-4C3C-9310-9E23F9DC0C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC27DCE-0F09-4669-972F-595519F9C2CB", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9167C4D-B1DF-48EB-8241-1F0470E1E789", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79624863-203C-4B56-A2EF-8C008C6527CB", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0D8243D-E465-4ADF-BC06-E1FC12E24533", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx350x-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "686A33D3-C9E1-446E-9D23-CFDDA1710466", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx350x-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "05A43F14-4D2D-4332-BFA3-E9CB9805415C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx350x-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F64FF9DA-0B91-427A-A2DA-33E7BDE90D6B", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx350x-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "283995C0-94E0-41D9-8E0D-BCE3B619EB55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx350x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "288DE710-8B6E-49F5-BEDE-E8B5A0DFE6B0", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx350x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12971B4-B9EF-42C0-A111-D782677186EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8867BFE6-11FD-468F-A9C9-3FA07DAA7EDB", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5D73924-5725-490D-8A50-027CD78A375C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx350x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "377A866F-5DDE-440A-8EB2-ADE214D08AC0", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx350x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D1B908-932E-4CEA-A4D4-E4B06D2B5462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84BFFEA3-8F68-40B4-95FF-1C32D0AAF4CF", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5B6BF7-650E-4446-BFFB-F3C1E7A0A9C9", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9B470FB-5E0C-47B4-AE32-38C36AFB720F", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAB23AA2-AFB7-41BE-85C4-3888FE89AC40", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0E5C6F-2479-4BFA-B174-57FA2BEDAA1E", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86576E5-F836-4B0F-897D-A6A1278ADF9C", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63E3B0E1-417B-4C8A-8CFE-E837EB952101", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2749EAF-5C2C-4BD2-B8D4-EBA35A1C3055", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CDA8C4-2050-432D-87FD-72B3E2DE71E5", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA40D117-8C33-489F-B0E5-68B59255A1D4", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E976BBA-EF7D-4A43-A2A6-11E84B73B658", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FBA0A65-828A-4848-8D47-8299F0DD1BE5", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EF1C442-4C97-41D7-B5A2-95261B64DDBA", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BE20DD2-E0DC-4C43-9908-5100A3011D65", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "768205F9-D999-4A61-BF35-C1018B9F4148", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FE43A56-F660-4242-971F-643D999E9D1D", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B5282B1-BC6C-4816-98EA-D8C6A1F1028D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1263576B-CE8D-4363-85DC-C79147F0BB3B", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D45D462A-CD9B-4AF6-8B5F-95A7629B7A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DE39EF9-46B6-4B45-829A-D69F9D8AFD0F", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CE7ABB5-A65A-401B-AD83-16B351CB2637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12B62A88-5824-4F1C-94DD-46609A2358B6", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C617D36E-A974-471F-A80E-705417D46AAD", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB98D51C-2B16-40D4-B6E3-8A2323A9CF36", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F62EFA9-C281-44D7-8F4D-846F1F3923BE", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92FD284-3709-44E1-85B4-66225DD5AABE", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C7A708B-23CA-4C5F-BEF5-5E8B5814AA65", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-8t-d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C638775-0000-4548-9C21-C9879BF3B645", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-8t-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "787FE6D6-FB71-4EE7-BAA3-B257E0EB0607", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-8pp-d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03647232-5BEA-43FF-9056-DC0A262C4177", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-8pp-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "467DA378-DC53-41A3-82E3-5F523288E975", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-8t-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F641CB3-7A52-4D71-B5E3-E087B5464D45", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-8t-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "078F6384-2A21-478E-B76C-D9AE2D4C06A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-8pp-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E0D5DFB-A96F-419C-AB64-A5DF5C7F025A", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-8pp-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "29E83FE7-D299-4F10-9E33-4EB4B0567E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-8p-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "818F8B3D-AEEC-4E00-8742-4FE69135EB27", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-8p-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C5CAD52-9DDF-4E74-9C74-24DD02BB62E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-8fp-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B24061-EA8E-49FF-BBBA-A8F5A62DA78D", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-8fp-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCF2792C-01F4-46E4-9A5E-2A04E591B43C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-16t-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B142F388-4C17-4BCD-9C97-E62F0AA5C586", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-16t-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FB071D-C328-42D0-8E35-E8DA3069752B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-16p-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98D1A3A8-91B8-4B27-A347-3AFD94CCB874", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-16p-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD72FB3C-0811-4430-B41A-6BBBA7B4CCA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24t-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3B7E283-7659-4A53-975E-ECF2FFB2BA9A", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24t-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9238C5D0-3669-43B2-B607-438DF91D59AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24pp-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FE7DB7A-42C6-4650-9CB7-86E65BA83451", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24pp-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "10104319-849F-4222-89B0-EB156501BD78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24p-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A255A07D-1591-4BDF-A66A-19542C8E6D59", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24p-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "53F23B36-32EA-4098-900F-2D301E74B347", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24fp-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ED4F19C-A383-4E43-87B4-9EFBEB4CE480", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24fp-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFFDD736-5FD6-4F3D-863F-65E702341047", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-48t-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96568DB3-CA75-490D-9813-78DE3A5FF633", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-48t-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1AF4C4-8D03-49B6-96D3-18B00BD7ED8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-48pp-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "675F72D1-B6C2-46A7-B49D-2EF603027A0E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-48pp-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCC8EEA-5EC5-4681-9204-89E5EDA8EA40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-48p-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61F1C7DB-F87A-4482-B993-5BDF9AB13D0E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-48p-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "928CD92D-90D3-4829-BB6D-DF303ABE1DAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24t-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0885DA-4757-4F28-B644-CB385C131CC8", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24t-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "773700CE-6952-437E-AA77-AA0E32EB1F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24p-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F9EDF24-2DD1-4F70-9BC9-90654ADBFA82", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24p-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4AEF792-BC15-4799-8496-0FE9220A25A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-24fp-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76977BFC-8C2F-4C36-800D-58038F63683B", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-24fp-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E20CD1AA-E7EF-403A-AC6E-C5B750019D5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-48t-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02ADBB3A-D02E-4B20-B4BB-7E3A3719B230", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-48t-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8077ED8C-BD4B-468F-A3C6-BC300E1C9646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs250-48p-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "294B0CA0-57F0-4365-A663-8E59C8C89785", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs250-48p-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ABC4E71-4943-4B6F-BAC6-603F91E41674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8t-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "766AD2AA-4421-4FFE-BC0E-C813F061186E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8t-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D91C60-E72B-4C86-A19E-443184EDBE8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8p-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A396D47C-99B2-4869-BEB0-B44F0DBB3250", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8p-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A429AEC-5692-428D-8DC7-47EC9081825C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8p-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67FB6217-2366-48D3-A153-C76B9B261D48", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8p-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7ACDE44-E156-4B20-82C0-8AA86EAF9947", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8fp-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89FC3769-C3DD-4E77-A990-EE755F0D2F53", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8fp-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "E473B29F-001A-4697-B22C-16B1C519B117", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8fp-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C34E7DE7-257A-4929-AE1D-06BD809D2F3C", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8fp-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "061925BB-B740-4CDD-97D9-52A24B5E7F77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8s-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3568C754-F1AE-49AC-99FC-A6DD32F4D6ED", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8s-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF2A0B8-CF29-4033-B365-DC3802630A0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-16t-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C89CF7ED-840A-4275-8709-02FAE7407920", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-16t-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD62CB7E-A9D1-435C-AC1F-5878346A2474", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-16t-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F5F0186-1E43-4A46-AEBB-556BCEA654FE", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-16t-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "27C4F998-F84A-43AC-BD8A-E9370DA959B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-16p-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5757173C-DF26-454A-85B7-7602E58A17AC", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-16p-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F796947E-079C-4CA9-821A-D8E3139CF064", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-16p-e-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F756E81F-3456-41E1-86AE-BA850CE2F90A", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-16p-e-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D517CD55-7100-4BBC-A361-61C7118D2F8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-16fp-2g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65CD2451-3C7A-4E5D-9C12-11B163A858D7", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-16fp-2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "570B5694-B948-4689-BB37-E4428F396E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24t-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E39628-7228-4379-8B11-48387D0F8FB6", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24t-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D3F59C-1F94-466C-A901-E4EF3E1D51BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24p-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56EC212E-6AFA-4B05-ACFD-FB3A127FF2C3", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24p-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFB9E0B8-BD07-499C-8E39-1E21666CAE4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24fp-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC239C-757D-47D7-9CDA-5D4B603CB7F6", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24fp-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A1A0BBD-D02D-49BA-99CA-BE2F92C6BBA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24s-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91687565-3F63-4552-9FFD-1C4929442E9E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24s-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7EDFA3F-5AE1-4602-AC1C-26AB78256A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48t-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B782C781-7ACF-4148-887F-46EA9186DFCE", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48t-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5689D5-2EE2-41A6-97C2-D1D684C19DCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48p-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1612BCC-4409-4C09-A36E-8C27BFCCA16C", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48p-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A248F084-EF8E-4703-914C-D62CECF64C83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48fp-4g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3FB426A-23A0-462F-88BF-94E224D9F41E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48fp-4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9780CC5B-8357-4983-BA77-6DA3A10BE17E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24t-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C9D2D8E-F1FB-45E9-84DD-B9C901E628D1", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24t-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "92907A6F-6ECF-427F-A1C5-F8FD161E4925", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24p-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5512091D-61F7-401E-AC94-AD6308AFCB66", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24p-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8B5771C-ED94-40DD-BEDF-EC64782644D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24fp-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FCA8DB-AF6D-4E6E-AC56-9DACFF48A06E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24fp-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F6219A-7241-47A5-8933-FA9E57EEA3DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48t-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "159E609E-79DC-4910-A887-DFF5AFCEB542", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48t-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E69FF5C-991F-4EBD-B291-3E9A8D00B290", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48p-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB77FEB8-F821-43E7-B456-E8727554F350", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48p-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5AA9C3F-EC1B-476D-9342-E71E6F893D0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48fp-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E70C5EF0-A10D-4517-872A-201D44DB0A7E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48fp-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E252BF3-445A-4BCD-A48E-C7196C401074", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8mgp-2x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC9799B4-26D2-4CD5-A013-661EAA543D12", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8mgp-2x:-:*:*:*:*:*:*:*", "matchCriteriaId": "432D6474-3F30-4DD1-8762-8B9968105BBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8mp-2x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13096AD6-F713-4165-9046-0AE42356EBB8", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8mp-2x:-:*:*:*:*:*:*:*", "matchCriteriaId": "50C1887E-EA16-4FC0-A8F7-602DCA8E4928", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24mgp-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "233A1E16-712B-4CEB-BA4A-A1690234E2C6", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24mgp-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A32C9F0-4138-4C28-B817-5F7507ED0811", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-12np-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9461EC19-0178-44DB-8B03-D4D8D6357740", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-12np-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8233545-9562-4ABC-BBE3-01B48DCBAC6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24ngp-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "909CFF5F-4A79-4A7F-8F49-FEFF579E94DB", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24ngp-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C99BEA9-45C9-4E69-A3E4-24E0D9109C1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48ngp-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "694A0D3B-60DE-4B69-9FEA-46F39405CF05", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48ngp-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08767A1-BE20-4522-9290-427C0E132013", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-8xt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7BB12CF-538B-454E-8EAA-19CD2984DFA7", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-8xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D8689B-2E1B-4AF4-8540-60615D28F846", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-12xs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4569CA0-2C1D-4A25-86B6-741E94716837", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-12xs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4AAFA53-D006-4F3F-A8EB-7EF371851666", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-12xt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "715D43B5-512B-429F-8507-F6E5B1A0765E", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-12xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6100B6A-C4A3-4AC2-B256-650A8A68FEAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-16xts_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5934B537-6445-4899-B9CD-1D5F4066B942", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-16xts:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C6E96F5-6E46-4CDC-8AC6-2293054ECA52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24xs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43D7B1B3-0432-4187-8259-2617CB9DC347", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24xs:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F7C7939-E2DB-4213-8805-0DC32B3A414D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24xt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96D8895D-77C0-4E56-8BDC-B493FC1322A3", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12A0F6E-506C-4DA8-8036-F3E0807D70E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-24xts_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3311A6DF-C3B5-4472-81AD-30ADF3DD5C96", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-24xts:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E94BC84-0054-4E8D-BC36-0567F29A8FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cbs350-48xt-4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E357D88-8CD5-41CF-83C1-C23A9A528A64", "versionEndIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbs350-48xt-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A2EF516-F859-4B9F-8CC7-4FE6CBB4906F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5ADD809-78C3-4EB8-ACCA-A0F8322C1B78", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "6812853E-C083-4841-A467-91130ED194BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25E4182-11C0-4491-9970-80058F7C019E", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "26A7AB18-C75F-4C63-9132-140EFC46E3C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF09DB6B-53AB-4DED-84FA-D1C2696342FD", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B70093-E9FE-410A-973E-CE847F08F43A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75B9DE31-19FA-40CD-B4CD-14DEB25CD2E8", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3503F68-CF84-468E-9A40-9F98875DD1C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E21B324D-F948-4373-A9FB-F07F56473774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "8CB83A46-C1E5-4CF9-9615-41F3C315FC02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AD5D6C94-CF45-4252-9F26-C41E5030F001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "5C95827B-4219-4EB8-B54C-21C9E852F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "735E92BB-E4D9-46B5-B9A3-A685934F456F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "17426691-ADB9-429C-8B37-A479C630B95A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EC313EB0-C812-4B77-B6EB-6E5D106CA1DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EB1E7DA8-4181-47C8-B86E-72DEA912DD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E942E2D0-C4AF-47C4-A9E6-3F26D66F9D1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "61C7AA57-56B9-4C39-98FC-A9C72F9B2C60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E9F50236-E49B-4BE1-BC96-E3EB3997541B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "DEC94589-59F0-451D-AE0B-1A2610EC9F8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A6451DB3-575F-4E48-9839-083F00C35B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "531206F5-A601-4A31-A3F3-0CBF4AF3B329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "3D1CFE7D-4EA1-4673-95A2-B5F98E375508", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "D34720E3-5EE5-4C3F-98C1-B288CAF4C114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "11F581CD-52CF-495B-A1B9-346D47C7F7D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "58F68741-2F9B-4438-8B6E-2E76E42032F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "11835FD0-2107-4FBE-8027-FBA60817E624", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AF68BBFD-A14A-48DB-89F3-50F90D308D97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A100F872-E7F4-4188-AB44-594F9612F478", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "6FAB4ACB-70C8-4BD2-9E1A-D5DCE06B3FBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "261CC970-0D09-4E85-A063-A68CE026B593", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "BE30BE52-B04C-467D-9A5E-8F71B4C2F3CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "797B03EC-8CE9-41C9-B77A-975A7664CC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "ED0F2E5D-7A5A-4205-8F88-1DC6F593E713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "ADEFD297-FDDC-4677-B52E-7FACA67FA71D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E5EDC0B7-F004-4841-B848-E653E4FF044B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AFF9A0C-8E6C-4358-BA5C-0F80004F62B3", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB39F2DB-33CA-480B-B02D-B1919B5AA8C5", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C2A0E1E-1DE1-49E5-A472-3ED6AF13758C", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F428461-20FC-4C3B-B3AB-B359D22F7CEB", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4015A166-22E2-4195-936C-B854FA783883", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D748BC0-B398-4C13-93E8-4332DBBFC82E", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8415CD72-6DBC-4277-920F-B62CD1D56047", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D017CC1-848C-4871-9473-A929CAAE426F", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5ABB894-A71C-4117-BF7F-B558B1061726", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E1E687D-3354-47AD-8FDC-10E307BAB08C", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B482FD23-8859-4A55-BD34-669C4644BEC1", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "519B33AA-5932-45AE-A014-09EFF434B14B", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76AC78F0-C511-4B88-8A93-5052C94AAFE7", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DEC17A4-A48D-487B-AEAB-4A09C979C47C", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46BA126-9008-41B3-9486-E9DFF572C1B6", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1280ABD-C15B-42BF-AF72-B54C3BCBAF83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA033-AFA8-40D0-8342-1EF4E8487CB7", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB53579E-E646-45D6-8702-993AF666247B", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82507F67-3516-40D1-9922-9BEE33FAC321", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EE8EE09-5C40-4B15-A412-9744C65A7982", "versionEndExcluding": "2.5.8.12", "versionStartIncluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de varios switches Cisco Small Business Series podr\u00eda permitir a un atacante remoto no autenticado reproducir credenciales de sesi\u00f3n de usuario v\u00e1lidas y conseguir acceso no autorizado a la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Esta vulnerabilidad es debido a una caducidad insuficiente de las credenciales de sesi\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad llevando a cabo un ataque de tipo man-in-the-middle contra un dispositivo afectado para interceptar las credenciales de sesi\u00f3n v\u00e1lidas y luego reproducir las credenciales interceptadas hacia el mismo dispositivo en un momento posterior. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante acceder a la interfaz de administraci\u00f3n basada en la web con privilegios de administrador" } ], "id": "CVE-2021-34739", "lastModified": "2024-11-21T06:11:05.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-04T16:15:08.577", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-21 04:23
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FFD9F9B-22C3-4F52-8474-0DD7543CADF1", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29DE29FE-8FF3-4A08-80B6-3FB03DF5F305", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A5CBC1-BB3F-4751-81B4-B40A682D7EEA", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3436DB0-18FA-486D-BAF7-92F1D87AFD28", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30728E0-E8B8-45DB-9421-B5ACD50B1A97", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "3208F54F-21C5-49EC-8FBF-03BAD10742EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67809B1C-8B06-4473-84B4-DBCD99AC1779", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E53BBA48-B11C-4E85-9257-61ECE5389CDE", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A60EF4E-A3A3-4E33-9561-BC8259062C2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBA6F78-8754-4D1B-9A60-1C19568093BE", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "98523586-0F3A-4B62-A972-8E9BA4F0DC4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E7B6BDC-2BCA-428B-82E8-E083F3661358", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CD3BA54-85D9-4688-8B90-612F96D452A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08287D78-F7B0-4CB1-B719-86DB482C3CDA", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95AD5321-1F1E-4699-8FBE-E9B04505092F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23B51027-95E5-443F-91F5-93D7B3B3320F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAE9706-8B37-4231-B4D4-CA6F527446E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "603D9E60-CBDF-4ADE-AB2C-903B412DE294", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DFEB361-1986-4522-BC23-06140F8D2625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FBBFDA-5279-4429-BFD5-27669148DB8C", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDC341E-FA7D-4B90-A5AB-E41822E16385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2B9BC01-193F-402B-8A18-ED5C897C23B6", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C835D1DE-A639-4CB0-947B-988C89ABED5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "824D4FDE-7D99-48B9-8F50-9C8DF4E5AD2A", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5D8296-7B6E-4880-8C5F-D7293118CE5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04E7ACB2-3D3B-4435-865A-3A1DB5AD055D", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F6551D-9188-44C6-8101-306D8077C0BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "410EAAFA-771D-4151-9583-D65AF0D97A17", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27D4259-24AA-4F4F-AC82-53D8BFAA303A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACFC9FA4-0DD2-4134-B9E7-D30B2AE45C8A", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "393E2CBA-BF91-4AA7-B014-AE9808EEDD3E", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "412F1F7B-6348-40A0-8C04-D4C6B46B3E5C", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7869C8D8-D110-4B91-87B7-D17BF4147A49", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B4F469-A2D7-4B86-BC0A-121A4E4DB193", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4634D2E-51B6-4C08-8309-CAD95CD54973", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "690B0EE1-C461-4A13-98D8-37CF5932E170", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8009A0BB-491B-417E-97F8-7AAA1B06DECD", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFA56C16-C780-44B8-8C0C-63737C1C06F3", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9345DCEC-A026-40C8-A353-3A0469DC5DAA", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFF357BD-04F6-46FA-BB4D-8A7595449B74", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "603591D4-5826-42E6-A8B9-E6C3BAE781A2", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1546E74-1020-4F6F-B9CD-63BE041C73E7", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A48CA589-1D31-4F39-9F5D-9F28EB0D600F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65778A40-A33C-4035-8DE3-997D9FF5EE6C", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8C01641-19E6-45FC-A359-93C9643ED565", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DE57A25-5323-4D1B-BCD9-B68302068F12", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "070D7935-38B0-4568-8DA9-A8E28786A803", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F21AC1A-62EC-4575-9655-F215C283B276", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D355124B-6687-4D10-9277-7E39A3737E74", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F259F652-2F84-4868-A68F-DF331F6B02FF", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CEAE751-6B97-4A64-A8CE-DD109E40E9C5", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28B7FD96-9F84-467F-A3F3-9AF0190CA63F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A090DD-8C6A-4233-9E9C-6FB4A3B33FA0", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3279C13-02F8-4961-8D2D-A63B6B4FE12D", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2A87FF9-BD82-454D-AE01-DCE5317DE0FF", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A015D614-E5C0-4E29-8293-776BB1A94D10", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E65353E8-9949-4C4B-932C-667279130E33", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D484F828-5CFB-4A61-BF53-B9F28ACCF6EE", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "162B0262-CE2C-4984-A6B1-B901E811B0CC", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D22DF022-C31A-495C-85A7-A2F8A16DC2EF", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F748CFB2-6868-46CA-B8AA-79657290651E", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69C67F85-36DE-44FB-9DF0-E644563A479D", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E9523B9-EA3D-4F5F-9F02-95588F33DF2B", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4887364C-8016-4E81-AD98-02292515530F", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FF0FFE0-20C8-4EA5-97E8-995727F0EEA8", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9189A85-A983-4ECB-BB63-997CCB5B4D46", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03C5F49A-EA97-4438-AA3F-6CB6673084E0", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6DC6B24-4789-44BB-B34B-904F5652C2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "304E4317-490F-4329-BDF4-17D6F58E2B6B", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01337909-675E-4A2D-9BB1-1AAEB310B3D5", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FBD67B0-489E-4900-9901-A08101E7FD7B", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07311CF-09CB-469F-AEBF-DA57393571C3", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22791CAD-97C3-4809-966B-2B668A1A0C88", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDD8A210-2AAA-4D89-899D-F6D7F52CFA68", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67135368-FCE2-4E02-ACB1-B142995EE812", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB290655-DD04-43FF-AD3B-D577BAC3EB98", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C711C1F-82CC-4D14-99A5-AF15CCCB0DBE", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1570F59-105F-4EA2-9A17-9184ADFD0BC3", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83843306-40D2-4C6B-B311-AAF996DC5487", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90FD61F-73C5-4298-A731-CCF873D8A126", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F826EE5-537E-40E4-97D6-A47EAAD45DDB", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79B78222-F16C-4AA3-906E-8F3C4FED1630", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF36971-C8DB-4928-BA6C-820FAB0415D8", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D74E7B1-E028-4026-8B7F-D6BF2B64B5BC", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE0B00F-3C72-4148-B6B3-F25AE5104A6A", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDAF6815-AE1B-4469-811C-99603BDA4B40", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B873CED-C25A-473A-81BD-61D0A3BEA517", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "282C1426-C20B-45ED-AF2F-38D9901E896A", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD4B57E1-A3F4-465E-BBCA-0430B75C1508", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30DC74C0-4461-4F04-84D1-04A10D06B012", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "566302E4-F223-4ABB-A94E-2EE6C0C14264", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E10B5CE-C9DD-4D9A-91A7-461F1B063C14", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C956CE3-F737-43E2-8737-AA539B8EC543", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F4A4F95-BC73-49FA-A1BA-2AEABA1FFBFF", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7311EFCD-9CB5-40A0-AC79-2D19E09EA19D", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66EF4196-6F2B-4911-939F-334862DF1439", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E78D5D88-A668-4303-A523-3B9018CC1922", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8573615D-0184-46A5-B3AE-3EC7D4727EF5", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD2BA73-6000-4C87-9592-928CED0660EE", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABDA8FC6-99FE-45DB-807B-34CE9438A325", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E688048-EC49-4718-A444-10ECFD21F991", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4A4E845-CE5C-440C-90D0-26C09780633B", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9826258A-7473-46D5-82F1-6E6CF56091E7", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F310AAE-76BD-4EC7-8A39-B17590A5840F", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C7F635-741F-4F78-9172-A4D16CDDCE95", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F416E8B0-1F92-437B-B957-CE0BFB70CA83", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97FE7A0F-C4E4-4061-B39D-5C97CD113444", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BCF14DB-59CB-4D71-A9AE-136E6681F791", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1FE2CA2-4B6C-48A5-9915-B948DB45515A", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D28C77-3C6A-4ECE-9771-5B85735047AB", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC9337A7-28EA-43FC-9CDC-E345A0D568EE", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "974278E7-129D-4624-AAC9-F4BECE9A8CEA", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52B4A2D6-D576-418C-A0CD-42D03D807688", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0CA5F64-87D7-4A52-AD3A-24CA521C3C89", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7DC622F-17C7-4635-860D-9AED963FAF1E", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B492B1-C84D-42CD-BBF9-07920E95D709", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9711C6-C647-4AB4-AE9B-9F156C59077A", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0373D61C-E076-47E2-9E5D-C88AC16B6F7F", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B512E8B-146D-4E6C-A0F3-1ADBCC9F146D", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10BB8F85-6D17-4C00-B4A9-EF5D5C677FFC", "versionEndExcluding": "1.4.11.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site request forgery (CSRF) en un sistema afectado. La vulnerabilidad es debido a las insuficientes protecciones CSRF para la interfaz de administraci\u00f3n basada en web en un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que siga un enlace malicioso. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante realizar acciones arbitrarias con el nivel de privilegio del usuario objetivo. Si el usuario cuenta con privilegios administrativos, el atacante podr\u00eda alterar la configuraci\u00f3n, ejecutar comandos o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado." } ], "id": "CVE-2019-12636", "lastModified": "2024-11-21T04:23:14.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-16T19:15:10.987", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-01 20:29
Modified
2024-11-21 03:38
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87326.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104947 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104947 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95F84EE8-5FE2-4BFE-91B1-5AB98FB7145E", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E128AD-0ED3-4325-A8AB-99DBE8737F06", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "119B8DCA-72CA-4B79-82C0-F05620ECFB78", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DCF7541-B413-431C-82E5-E12AE5D992AC", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97BCF797-3FF4-40A1-B8C2-4080E09640AE", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AABF11-47DB-4DC4-9B90-2D3258EAFAAD", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE86224-1883-4A5A-A49F-09FF51884472", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "479DB0EF-166A-4C0D-9659-6F2891C88A18", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B519DA0-9C2D-4FE9-BD8C-5C94AFFF701E", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87087817-E993-4D58-864C-6FFCFB924AD3", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D876D181-2F4C-447A-988A-BF585E5F38D9", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56AF6213-3930-4B0D-9A15-54C8027CF9FD", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B13747A0-FE84-4DED-923E-AA65BB4B5BC9", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3885C4C4-579F-49C7-840F-256BC8FB3E34", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E313896-91C7-480B-AB3C-A4837F9AC363", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF86F983-F89C-4ED4-A092-981577DDC737", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA5D51-86C8-44CF-A100-2F5B2FD378FF", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C2F8BDA-9360-418A-BEEF-E41A5CD345AB", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89C0F0FC-C706-4D8B-B396-12BCBE2FF6C0", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E97DA27-09CF-4292-A91A-ADBA744D1C8F", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDDC3FFD-1161-41B7-843C-83D07D0FF567", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "980AFDC6-9A11-46FC-9570-431CC9667D98", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4A5FB60-E017-4F83-9809-052CFBF1B335", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D273D904-0FAC-43A5-A89F-1FDE2952A615", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21AD5E5A-CAEA-4259-BEF4-CF060FC80F77", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B1C306-BC99-4A86-919A-3A72FA94686B", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A429813-D852-4E17-BD52-FEC0C1ADDD23", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AEAE0B-80A0-49E8-9206-454D3B4EB5B2", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87326." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de gesti\u00f3n web de Cisco Small Business 300 Series (Sx300) Managed Switches podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) contra un usuario de dicha interfaz en un dispositivo afectado. La vulnerabilidad se debe a la validaci\u00f3n insuficiente de entrada de datos de parte del usuario en la interfaz de gesti\u00f3n web de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace manipulado. Un exploit con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz o que pueda acceder a informaci\u00f3n sensible del navegador. Cisco Bug IDs: CSCvi87326." } ], "id": "CVE-2018-0407", "lastModified": "2024-11-21T03:38:09.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-01T20:29:00.387", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104947" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-21 04:37
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz web de los Switches Administrados de las series 200, 300 y 500 de Cisco Small Business, podr\u00eda permitir a un atacante remoto no identificado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a la comprobaci\u00f3n inapropiada de las peticiones enviadas a la interfaz web. Un atacante podr\u00eda aprovechar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n maliciosa a la interfaz web de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n de DoS." } ], "id": "CVE-2019-1891", "lastModified": "2024-11-21T04:37:37.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-06T02:15:11.183", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-26 17:15
Modified
2024-11-21 05:31
Severity ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2330AAA8-F175-47B5-A9A9-67238AEBDD25", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2253CBA-D5A2-40C6-8B18-674EEDB5A499", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57E3C308-E217-494A-995E-15F7C04F61D9", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4B3D6F5-324A-4F4A-B395-8CBC956CA4AD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE0F8CF8-612F-4312-A4DB-43692AB39CA2", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "605D6944-BDEC-4115-8C29-5B4D48A4D0E0", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EA8E1BE-92DE-4E40-8695-DAAE18B117C7", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4540AE8E-506B-4CB7-87DA-1103ECBDD1E6", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "969ED439-D472-49F5-BCC4-CFE7B64C37D8", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A53E249-5130-4E33-B752-BE9C69B324E9", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D2C0C44-D5F5-442A-82F0-855D8303AA98", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A229DC3-70E8-4934-897E-234F9678AE70", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B5BC355-D395-48FC-A237-E9F690D451BF", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB6E6E94-C9A4-41AD-ADDD-022CAD8E944C", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F599B783-5D75-487D-8039-7D4514301F1A", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E3579AB-575E-45D1-97CB-BC9BF72747E7", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6E4A5B7-FE7C-48C5-B1B4-DCBF3ADC1610", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA0D6A9-5674-436C-84C4-8311CD527E93", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E55A74B-A9CA-41F6-8741-5D2C3F29B99C", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B149239F-0159-4F48-B06D-3004BA1394E0", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EB2D042-C74B-4E6E-80D8-04E2E43425BD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FFC06CF-B049-4168-A83B-78507AD8F4DD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2B632BC-458B-4701-BD2E-D6A6F3A7E6DB", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD23D531-63DF-46DD-BF9F-9009829587C4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83EFB88-38FA-414A-B86E-FF201BA80959", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF5A9-EA0B-4BDF-8535-8168D83BC664", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A80CEA-3971-40A3-91B3-8645C5CD6B35", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A70C6D0-D4D8-44C6-B615-37F420CEE10B", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E930941-9B3B-4A41-BD67-C5CCB1C9D9BD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C94E1974-468A-4126-9EB4-A02129959DBD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0121515-56D3-46F5-AC87-642F141D15EC", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BE15464-4290-4B0E-B9AE-F26F7F47895E", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CABEBFCC-F22F-4610-B869-E7293441DB60", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CDF41C9-6063-48E1-9B8B-4F1244D091EA", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA9F7B7A-07B7-49C9-B8C7-A407240ED483", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F9F856-7EA8-4822-8EA5-4B0E71EE4A38", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7D4A841-F03E-41EE-8541-3688757C60B4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "121932D3-C347-4A39-948F-AFB7255ABAC6", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7551CE16-7308-41A1-A714-CC32D66D7535", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "296414E3-E79D-40A4-AD0A-3180B3A4EAA6", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81719D0D-C016-4F40-9965-ED8B8FBE58F1", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A2A7477-AB48-4751-9E86-1B4A51D7776D", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B02EB990-9D20-4FE5-8B60-8F71218387C9", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA40A1AE-2ABF-46A2-8CCA-68171FAEA616", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47AFF05E-7F13-4197-9655-2255C994F5BD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C63AAF-B04B-4D27-8A80-97B6135107B5", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C26AB7-762C-41A6-B646-1E3E07C1221B", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A605BD-47EC-4E35-B6C5-915D0B7B9C7C", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "188E5C34-DE23-4B7F-902F-3382AABB7EC3", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DFF4154-ECC3-40EF-B7EF-03C80652BFC2", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D454E120-20F6-49C9-B730-CC073CD3B47B", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ECA4E1C-3384-410A-8C66-4BB0C5856601", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0459CBD9-D8D6-46A1-99C1-83F51E715267", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "078A0F4A-AC48-44B8-B112-ACF9DE807DEB", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6F427B1-D62B-42C2-96B6-F2A22832583D", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE7F347-78D1-49BB-A7D1-AD3F87DC6C7A", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1110D21F-7B01-4098-A38A-9B3A54604E0D", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE1B116D-89E1-452B-A3B8-EE5C6BA1A0A7", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48E91FC5-A3C9-4628-8A16-E510A7B4A95D", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EC217A-C8B3-4E78-B654-E83382CC1426", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04158003-F7A2-49D5-A135-EFB863CC6528", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFD62997-1916-4205-806C-FFF5A4E3FD58", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "761B5A71-92DC-4051-AA4C-EB8482193698", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6D6FAD-13E4-437B-A07B-D6D535413A68", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B70C2A7A-A458-4FE6-AECC-3A3718C6646A", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7B6684A-8F2D-4F19-9872-1680DD26E889", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35B5812A-DAF1-4CB2-BBA7-58E1E02D9153", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8A98916-8DB1-46B6-82ED-E7B1BA1AAB2D", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "614FAF10-501E-43B3-9B85-F40ABF146C27", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E49A6CF9-907C-4388-BCD7-4FDABD9D1610", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "337B23A0-E66A-4C82-9E57-002C2C4A2265", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24C4E926-A667-4A7F-AB5F-2417D77DFAD4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E41B85CA-59B5-472E-B555-F8ACEB8DB4E5", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22960F56-F3C5-4F1D-ADCF-A6ACF53AB798", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0837BE4D-999D-4933-AD2F-875EDAD8B6BB", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7177C86A-B8C8-40CA-8973-9CF1C3F103A4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E56236B2-D919-43FF-B3A8-90CD575D39BD", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF31396-F6E3-4B32-8DB9-0EF0BDAEF745", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CF861DE-B7C4-42C4-BE9C-22D5F9FA3EC4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDFC783B-20D6-4EEB-B2C6-0E7E0A27DED0", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9563D3F-B6CE-4FC5-BA9D-D6C85C21A2F8", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A596AA5F-1260-40B5-874C-BAAA7B52C7B3", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1E857D8-F10F-4261-BE4F-B7A78740082C", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCA67989-A4AC-43B6-BCF5-4768F0B5D2B0", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A5524FE-CA66-4CE2-8B44-A84776397FAE", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34613F65-D402-4C06-BAC0-42CAEE0CA7F4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCBEFEF7-58C1-433F-84C3-63A189A93621", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8EBFCDF-7D2C-42D5-AAE7-04E0FFEE1F1E", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AA07BC1-3357-4EEF-93B2-7087338B6606", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A8AB96-ED85-4587-962E-966329687EED", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED6617FB-15B4-4D1C-9E0D-AFD1108E0A41", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "048DDACB-1954-4AF0-A23D-0E394DC4497C", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6135300D-7C42-4766-A924-F72A611BCB9E", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCD77A0-4104-4DE3-9134-743BFE69D752", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43805734-4F7B-4C3C-A359-508B22BCECA6", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C9A3713-5964-4A89-BB44-730E7DC9B7E0", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A717082-4B71-4FB2-BC43-113295F0008D", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "194CF955-EE25-41FD-B8F9-AE9E352C3F18", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC9EE2D-6DE7-4574-BC73-76A5A04EB6B3", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77BCF729-31BA-48A3-B6A4-8E9D65F835EC", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C09948AE-1001-4E18-BDE8-7E127ED314E4", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EC5D0D6-9A6D-4BFF-AD6E-21755AC9F8C5", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B1A1966-7E47-48C0-AAA2-1F8E4F687BB7", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50B20068-195A-4C1E-B14F-ECD895693918", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA068C37-E9BA-4AD4-A198-ECB800779848", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "600B3B6B-6F5B-4983-95AE-D76BEA874E79", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE7449A1-9746-4000-96AD-D3F0145BAF8C", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB3F67B0-4D92-485C-B7CF-A42E68F81AC5", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44D5D35A-5B0D-4C36-9669-BD39E38A4A50", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED53CFCE-DB09-4723-8D81-63DAE92A9E25", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D74D0C6-1759-4DAC-93E0-AAE2D3101303", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ED479AE-A874-47C5-80CE-9AB09D2DC8C8", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65E85B18-AB4B-4CCD-B66C-058E97352D6B", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "332789D6-834F-424F-BFA2-BC4FE3446923", "versionEndIncluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected." }, { "lang": "es", "value": "Una vulnerabilidad en el motor de procesamiento de paquetes IPv6 de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente del tr\u00e1fico IPv6 entrante. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete IPv6 dise\u00f1ado por medio de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que la CLI de administraci\u00f3n de switches dejara de responder, resultando en una condici\u00f3n de DoS. Esta vulnerabilidad es espec\u00edfica para el tr\u00e1fico IPv6. El tr\u00e1fico IPv4 no est\u00e1 afectado" } ], "id": "CVE-2020-3496", "lastModified": "2024-11-21T05:31:11.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-26T17:15:14.210", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-28 15:15
Modified
2024-11-21 07:40
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.
Cisco has not released software updates to address this vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "8A9AC171-14AC-4002-8098-560B87552B50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "55A2374E-6C10-4116-A65A-4CF16DF9FC62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "D178FCF5-DC70-4E50-AC48-541A9D10BC6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "7C28921E-6F49-405D-8892-03C3B471CA60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "9BA9D18A-B1B2-44CD-AEF8-65038EE5BFA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E21B324D-F948-4373-A9FB-F07F56473774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EC313EB0-C812-4B77-B6EB-6E5D106CA1DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "61C7AA57-56B9-4C39-98FC-A9C72F9B2C60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EB1E7DA8-4181-47C8-B86E-72DEA912DD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E942E2D0-C4AF-47C4-A9E6-3F26D66F9D1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E9F50236-E49B-4BE1-BC96-E3EB3997541B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "DEC94589-59F0-451D-AE0B-1A2610EC9F8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A6451DB3-575F-4E48-9839-083F00C35B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "8CB83A46-C1E5-4CF9-9615-41F3C315FC02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "735E92BB-E4D9-46B5-B9A3-A685934F456F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "17426691-ADB9-429C-8B37-A479C630B95A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AD5D6C94-CF45-4252-9F26-C41E5030F001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "5C95827B-4219-4EB8-B54C-21C9E852F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "43D92875-4121-41B0-8A3F-AAFFD6AE06D7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "6A7315B4-7D78-4AAF-A2ED-B3223F15E357", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "4E35D030-BE72-4B10-A6F7-2E974820D080", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "4E13A680-CE5D-4E72-8CC7-15C969452909", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "37DEA5BF-6763-4835-8427-0C186BE9B8A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "F9083862-CB21-4B2B-8C79-41EACB8DAC05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A6B61004-D935-48EF-A9E3-E7735B1BB2C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A5E14105-EDED-4BA7-90BC-255820C2A3C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "9787C626-A184-444F-A7E9-4A6BB492ADA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "7AC232C5-72C6-4C26-A541-32EC60B4B51A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "28F53652-ED52-403C-AF2F-66DA704E2EE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "8E0A9611-5958-42CD-9035-EDE62F8ED736", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "0E3094AA-4983-46B8-8DBB-D899FCC83085", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "85C058FB-AE72-4A03-86E2-A3FD2D154B90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "FA01D2F4-C37C-4182-A0D0-8B9C565B9DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "559F87CC-2CAE-4993-AF18-2B4C20B0F86C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "531206F5-A601-4A31-A3F3-0CBF4AF3B329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "58F68741-2F9B-4438-8B6E-2E76E42032F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "11835FD0-2107-4FBE-8027-FBA60817E624", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "D34720E3-5EE5-4C3F-98C1-B288CAF4C114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "11F581CD-52CF-495B-A1B9-346D47C7F7D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "3D1CFE7D-4EA1-4673-95A2-B5F98E375508", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AF68BBFD-A14A-48DB-89F3-50F90D308D97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A100F872-E7F4-4188-AB44-594F9612F478", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "BE30BE52-B04C-467D-9A5E-8F71B4C2F3CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "6FAB4ACB-70C8-4BD2-9E1A-D5DCE06B3FBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "261CC970-0D09-4E85-A063-A68CE026B593", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E5EDC0B7-F004-4841-B848-E653E4FF044B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "797B03EC-8CE9-41C9-B77A-975A7664CC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "ADEFD297-FDDC-4677-B52E-7FACA67FA71D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "ED0F2E5D-7A5A-4205-8F88-1DC6F593E713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AC7C75B3-15EE-44A8-9E43-260AE291B976", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "56410391-DF3C-4DCE-A60B-353E7BF29512", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EA0F0352-CA25-4B88-B085-24284D46E93F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AC49F3D7-B297-4E6C-9097-8211F73C0E86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "6F677D33-4599-4473-8A27-D23AFAA0F39F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "72A0989C-1D6E-42EB-A2E6-160230278869", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AD864A7F-BF96-463B-893D-F07EBBFBAE05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "752D57E3-AF8A-4CE7-A8E6-E56F87065D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1280ABD-C15B-42BF-AF72-B54C3BCBAF83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "FCEAAE08-05B1-4AF9-A4D1-1B64EDCCE0E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "6E4772E3-D480-4B46-A4CE-0F5AD0A653F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "0168AC27-481D-46F9-9D43-86B32396C558", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "626915FA-9BBA-4488-944A-8B4AB12F875C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "48ABC697-8FD0-44C7-9F76-18F282102F92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "B1CAA825-B0AD-4C14-BC09-231ED4938436", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "88440C60-5B68-4F12-A11C-C77A7AC311EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "7EC4DEC4-4680-4875-9216-BB17515DC13A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "86BDF7D0-77DD-4EB9-8479-E7FD571B5D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "870CFE1B-C197-4736-AC1E-9EE3C78C66FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "5E564D0F-9930-43E6-9870-62FA6EA43709", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E714B36-1E4C-44AF-B77A-EC3096AA2453", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "FFA72C42-80CE-4A79-8E78-573ADC05F23C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C006D0E-7431-437B-A7B3-BCB254DCC3CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "EEC6B8EF-216F-4F8A-A773-A5FE43F9879B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "86DBC700-58C8-4DDC-B54A-ACCCCE96CBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC813BE9-C9CD-40CA-8CC0-6049A7AA1649", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7093AE-315D-40F3-B5D3-EF5ADE895F20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "9397D6BD-A353-4250-ACF7-C8F1351D52F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "7C6ABCD7-9851-4F3E-9AC9-61104B1CB773", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "E9F81FE8-D42F-48DE-B122-01F135898A7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "50AFA121-C169-4BD8-B754-E82A37681C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "2BBD8B5F-6712-4F62-92D0-B50773ACA4D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "48C330A1-ADE4-4609-B7BE-E3FFFAB5F7E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "979E74B4-244D-440F-8891-7B325A46BCB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "CE6B497F-75EE-4578-B7B1-C90F3ACF1917", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C21C791-1663-4E7D-827E-666CAF15EE72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC8A5668-3520-4F59-8EA4-BAA6333AAC1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "FDBF7D0F-6B27-49F2-82A3-15DD33F1AE7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "B6DBE200-46E8-41FA-AFDC-8CED27D6F511", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "23BEB0F7-66C0-4951-9F94-9C61213EDED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "77A71D69-1243-457E-974D-49EBE00D8BD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "23022901-0DFF-4156-905C-81812A423526", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "38C16F20-05A8-459A-843B-B8694DAD45E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "BE6209AA-2789-4272-A57E-57DEBBA05E4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "C7DA3FD3-B1DA-4B1A-99B8-978B59B45FDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "29C16C97-F75A-4AF6-8EC3-DA9F61171C37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A8835AB-405B-4CB8-8041-4E6C50055F81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "CC030FB6-355D-427F-B0E7-245204ABABE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "832FCECA-A9E4-4ACE-96D3-165745977024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "24F4091E-57FB-4100-B217-00D94B87E18B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D44DB8D9-D92D-4293-81F2-3480F4E2224A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "BCB131CE-BFCD-4FBB-B257-BE87946C95FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D2C7D63-0402-4BB5-86DC-2A0F875B5E37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE5282D8-FD1F-4F1A-8C7E-0E126B858321", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "1152F937-B226-4593-A49B-31FBDBA69B13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "121EC8DA-2CF5-4F8A-AC88-5E947283E1FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "90F9D645-9E95-4398-A8A6-FA7BCBE0E3CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "60C3AF65-64A6-4303-9624-6CA63759B11D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "2CC337B3-10E5-4A95-A260-B2B64213BDD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "3190DE0A-9BD0-4E1A-A034-B6D725EF123E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABE50490-CB24-4584-9776-39CDEB86E04C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "EDE555F2-15ED-465F-8AF8-805BFE88CC3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DBA7829-ABCE-42E8-AA1E-7EDCCF6566FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D750B49D-412A-4369-BBE8-81AB7EE331B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "EA8BF101-B89F-4904-AC6A-3DFACA6C8674", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "8108CA60-8E15-46A7-A377-5D38F0BEF861", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "C4B083FA-400C-4AF1-8019-16364E1E4719", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "37D24947-89EE-4154-9437-ECE5F2413DF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C8C4A9-5782-4121-94A0-99B45312D3EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "4B8A0140-9152-4643-BBAD-7D4D2B701678", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24mpp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "95CC3649-2DE3-46E5-8B75-8B7B842682E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1280ABD-C15B-42BF-AF72-B54C3BCBAF83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "F5055E33-E816-476F-BA37-7042F5925D62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2C6A6-F7DA-45A0-9AB2-D4E74DC47C71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mpp_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "E801FB4F-3897-4DB3-8C75-A9F8B4FC180E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "626915FA-9BBA-4488-944A-8B4AB12F875C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:1.4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "497A4284-1D77-4908-A1FB-5A1E6A9F4DE4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.\r\n\r Cisco has not released software updates to address this vulnerability." } ], "id": "CVE-2023-20188", "lastModified": "2024-11-21T07:40:47.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-28T15:15:09.943", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-sxss-OPYJZUmE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-sxss-OPYJZUmE" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-87" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-15 22:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "842B9A79-D574-41EB-8027-9038FC0E3F64", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12D57C7-8A54-4124-8E1E-37F03A5C985C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53AD939F-CD46-4127-BED2-C90D9219367F", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "548424AC-7644-4FEE-88A7-24C7E7F814A1", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2203C60A-0069-4F5A-AAD7-BA99A45DC779", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AF4A347-A9EC-443D-8244-9CCF18E857C3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCE45D7A-2724-45C3-A41F-9E38D37932C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E99E251-5F53-4968-85BC-A0EFA7891917", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09CCE38-1E2B-4BD1-96B0-535A51BD698E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BB8399A-B1AD-4201-9A85-AE332F8D46DC", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C37F67-8132-4A19-A702-7B6C60F9897E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13DBAA04-CE95-4549-9457-4900AB3D1A8E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4490464D-BAC7-489C-A2C1-4971AC8B7F54", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF659800-49AB-4416-B6F3-FF5F8F41C72B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAC0FB45-E376-4EFF-8866-2E42494296BB", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3623874C-7E67-40AF-A094-499E1857D048", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E417898B-0AE2-45AD-944A-9EE6D806CD8E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23356E45-B7B2-4A32-B821-D1C53D3FD6A5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDB5362A-022F-42F8-AD49-C2557243B972", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1175B98B-DFE3-4A48-A453-80FA643EBD35", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "991DA0D7-7142-4EC1-8991-195D2F5D0B31", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BC93E7A-6055-49E6-AEC7-F819113D902E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "645781BB-E440-42F9-9369-495366447B30", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FB911D6-F531-42DC-9537-B7DF20A09CE3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C758954B-BCD6-4C06-844E-C0FB1626D024", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57E6CA13-6231-4722-90DD-4495F4C10E0B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DEB673A-B39B-49DC-9CF0-D1E636068E75", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "107F975E-EEE4-4F40-BDCF-9E5F86528982", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91AF6345-7D52-4467-9864-C63F888613AF", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B2FC17-14E6-41C9-B3B2-D8791EB1379C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28EC4789-E1D6-47A4-A92B-0F6196688159", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4A9255C-6562-4DBC-A42C-D5D74FA948C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52978A27-0D0E-4DB8-B988-D5E6F608DC1B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38531BE0-3233-44F9-9F91-74A479CA27C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EB87CFE-3151-4473-A006-258325F2E079", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en el procesador de paquetes de entrada de Simple Network Management Protocol (SNMP) de Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches podr\u00eda permitir que un atacante remoto autenticado provoque la aplicaci\u00f3n SNMP de un dispositivo afectado para detener el procesamiento del tr\u00e1fico, lo que hace que la utilizaci\u00f3n de la CPU alcance el cien por ciento. Puede requerirse una intervenci\u00f3n manual antes de que un dispositivo reanude las operaciones normales. La vulnerabilidad se debe a la validaci\u00f3n inapropiada de las unidades de datos del protocolo SNMP (PDU) en los paquetes SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete SNMP malicioso a un dispositivo afectado. Un aprovechamiento exitoso podr\u00eda permitir al atacante hacer que el dispositivo deje de pasar el tr\u00e1fico, lo que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Cisco ha generado actualizaciones de firmware que abordan esta vulnerabilidad." } ], "id": "CVE-2019-1806", "lastModified": "2024-11-21T04:37:25.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-15T22:29:00.247", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108335" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-21 05:29
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/100933 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100933 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B04BB6-59CF-44E5-A0D3-BE67B5C57854", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "037DBB1B-D044-44E4-A52A-567BD1CE2C69", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1E08101-09E4-4E03-B47B-BB5961491E67", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "315B9FBD-8132-4192-9F10-4C11258ED524", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB95AE0E-2534-4BAC-9480-7BC17C5EB1D0", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "284A43F4-C4AB-48AD-B4D4-EFB61792964C", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC338E75-CBEF-4010-B3C9-24B78DF05414", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90A4C654-6C95-4D65-9ADB-7D53A03C6B53", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C37A7ED8-E54E-44D4-9612-9114F8FDE553", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A2B6310-E2C4-46D3-AE0C-2E318870E239", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB328ED1-9705-440D-862D-F52B4D195363", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D84629A-B96B-4492-9988-94A5BB92D161", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC9DAE47-423E-45E7-B6DB-4C104371D0F2", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA4E70C-C089-4B70-A905-356266C03D68", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EEDB984-EC17-414D-9514-8595D168D902", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4E701E1-BB13-4742-B925-409DECE26E0B", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEC87CC6-7F24-46BA-A1A9-8C0DF40C3E51", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B10721A8-98C5-4EBD-B208-553FD5BCCE4B", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4AD929-F658-4BCA-B5A3-9142C6380947", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC2011B9-CEDD-46E4-8784-FAEB90E2A4F6", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF3B19AA-1F87-4D61-817F-AED3E5C6ABAC", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886DD687-6981-4616-B4E9-3ED1F0949CE7", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17425E0B-2C3C-411B-8694-AFA4275F1A39", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "761E4820-0E4A-44F0-B738-979116586A46", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CE91665-49EC-41F0-90F0-D2C03A0A2E81", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D753EBFF-AE47-465F-8B40-30EA41C01C2F", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0288DEE-2215-474C-8833-2F4EA16DBA0B", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21890651-67CF-4EA4-92EF-89A9060100FA", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EF8919D-ED09-421C-B649-36795689F1E5", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F97911-5452-4C23-A2FC-14DEC4E47433", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "582BF27D-BC0F-4721-BEEA-6B9099BBFF2F", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC186187-7420-4164-A606-B5F10DC56105", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9975567A-C169-45B9-99B1-500A96391C53", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DC11D96-72FB-40E8-BFE1-4AFDA00DD41B", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DEBD433-A018-4AFB-992E-675C4CC5D2A6", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0C13803-5052-423C-8C93-2C54DBCBCCDE", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12F620D4-6023-4B41-B7DF-48A72A5C0A78", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E98BACEF-AF33-4900-A2EE-7298C0637C3E", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65E9F796-2B47-4596-B0D1-A586AF9F3C8E", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17A4C75C-5651-46DF-9E9F-0F09841B32A8", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F54552BD-1505-4D65-A5DA-0BD476B164A6", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EB24D4F-2EFF-478A-A1F1-ADC4D2692859", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED0BEAE-B725-40B1-A8AF-F747A5D3EC0C", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "6812853E-C083-4841-A467-91130ED194BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D486D2C4-DF6F-4E8F-8BD0-5891AA8AC763", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "26A7AB18-C75F-4C63-9132-140EFC46E3C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3436FDC5-9FC4-41DC-8989-98F6EC0BE2BC", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B70093-E9FE-410A-973E-CE847F08F43A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F81A5EB6-94AA-455E-9609-035A18DDF374", "versionEndExcluding": "1.4.8.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3503F68-CF84-468E-9A40-9F98875DD1C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BC6336C-2351-4192-99DF-3C0A201F7593", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8141B0C-61C4-4F0B-890C-9540B579386E", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD930606-ED38-4E11-85FB-2520A85285AD", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C9FD643-13C5-4327-90B8-DEE683658874", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BD33FFF-FE0E-4852-9F56-5843433D7823", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC54297-D4E6-4786-8A98-D965F9EFD67A", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93099CC0-A7ED-4E27-A4FC-3FD6C4D98193", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "611F027A-1FC2-449D-AF7D-FF0D7886177B", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34E3F010-D1E9-4238-AB19-975ED5EFB5E1", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F0F5B31-B746-4EB5-AB6A-E13602A1A3FE", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DACF69E-8AD8-4764-89A1-F158895F3084", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE932F-6DCC-42B0-84FF-D172388102BA", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3AB71D4-B89C-4A08-8BF8-EEB67F3102B8", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BC96BB1-2482-4ADC-BF0D-D6D7AEB97017", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B1EEA1-D5B9-4D87-A2D0-7FB57163D4B1", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E40B7BF3-701B-49B0-ACDA-DF4D8E88165D", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDA6CF9D-12BB-438D-807A-E4D3CE24CF8E", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F18B486C-C92E-4D4F-8206-EB8E9A3850AF", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E9C557-F886-40AC-9B17-A3BB1773C0C8", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B885C5F5-C236-4C5F-9CAC-76F1E9464838", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FC04842-1D72-4288-BA8C-EABA5AAB904B", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C56E6CAD-F314-4D17-8110-9C88C27D1A07", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F2519C2-F0EE-4F99-B537-23A8A48E865C", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9298FA5A-9B5F-4DCC-8FB3-F71BE7D34988", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50362982-A566-4D4C-B395-9DE48CDAE5A5", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FB61FC6-4608-4EBE-A95F-198868E6BCF3", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96838C5E-F1B8-401F-8A1A-6BB91756912A", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12014E4E-78E9-48E7-915A-2166F5237BFC", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F503F055-A8A3-4782-99C8-02826AC2D512", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0D1C787-27C4-4492-862F-C959E1EE3372", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22543B6D-96EE-4C88-84D5-6350DD0F2FB0", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43741AC4-4CD1-4F02-BC92-5A801C449DCE", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C1DC6C-D860-4061-B8EE-2DBDA787F1D1", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E265502-609E-4E6F-9817-9341E1AA80FD", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D486C-6F51-4C37-94CE-C53D6F29454E", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F960F9BF-90C1-4CDB-BAD0-CFB053E85928", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA4ED222-F963-425C-A99F-D4CACB314747", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B2A832-8E66-49CF-99B6-9CDD1B1AD400", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B89D6B8-6A7B-4096-A3F7-7E24EBE8CB16", "versionEndExcluding": "2.3.0.130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377." }, { "lang": "es", "value": "Una vulnerabilidad en el subsistema Secure Shell (SSH) del software de Cisco Small Business Managed Switches podr\u00eda permitir que un usuario remoto autenticado provoque la recarga del switch afectado. Esto resultar\u00eda en una condici\u00f3n de denegaci\u00f3n de servicio. Esta vulnerabilidad se debe al procesado incorrecto de las conexiones SSH. Un atacante podr\u00eda explotar esta vulnerabilidad iniciando sesi\u00f3n en un switch afectado mediante SSH y enviando un mensaje SSH malicioso. Esta vulnerabilidad afecta a los siguientes productos Cisco cuando SSH est\u00e1 activado: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches y ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377." } ], "id": "CVE-2017-6720", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-21T05:29:01.043", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100933" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-21 04:23
Severity ?
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FFD9F9B-22C3-4F52-8474-0DD7543CADF1", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29DE29FE-8FF3-4A08-80B6-3FB03DF5F305", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A5CBC1-BB3F-4751-81B4-B40A682D7EEA", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3436DB0-18FA-486D-BAF7-92F1D87AFD28", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30728E0-E8B8-45DB-9421-B5ACD50B1A97", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "3208F54F-21C5-49EC-8FBF-03BAD10742EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67809B1C-8B06-4473-84B4-DBCD99AC1779", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E53BBA48-B11C-4E85-9257-61ECE5389CDE", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A60EF4E-A3A3-4E33-9561-BC8259062C2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDBA6F78-8754-4D1B-9A60-1C19568093BE", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "98523586-0F3A-4B62-A972-8E9BA4F0DC4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E7B6BDC-2BCA-428B-82E8-E083F3661358", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CD3BA54-85D9-4688-8B90-612F96D452A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08287D78-F7B0-4CB1-B719-86DB482C3CDA", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95AD5321-1F1E-4699-8FBE-E9B04505092F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23B51027-95E5-443F-91F5-93D7B3B3320F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAE9706-8B37-4231-B4D4-CA6F527446E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "603D9E60-CBDF-4ADE-AB2C-903B412DE294", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DFEB361-1986-4522-BC23-06140F8D2625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FBBFDA-5279-4429-BFD5-27669148DB8C", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDC341E-FA7D-4B90-A5AB-E41822E16385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2B9BC01-193F-402B-8A18-ED5C897C23B6", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C835D1DE-A639-4CB0-947B-988C89ABED5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "824D4FDE-7D99-48B9-8F50-9C8DF4E5AD2A", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5D8296-7B6E-4880-8C5F-D7293118CE5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04E7ACB2-3D3B-4435-865A-3A1DB5AD055D", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F6551D-9188-44C6-8101-306D8077C0BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "410EAAFA-771D-4151-9583-D65AF0D97A17", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27D4259-24AA-4F4F-AC82-53D8BFAA303A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACFC9FA4-0DD2-4134-B9E7-D30B2AE45C8A", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "393E2CBA-BF91-4AA7-B014-AE9808EEDD3E", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "412F1F7B-6348-40A0-8C04-D4C6B46B3E5C", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7869C8D8-D110-4B91-87B7-D17BF4147A49", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B4F469-A2D7-4B86-BC0A-121A4E4DB193", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4634D2E-51B6-4C08-8309-CAD95CD54973", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "690B0EE1-C461-4A13-98D8-37CF5932E170", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8009A0BB-491B-417E-97F8-7AAA1B06DECD", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFA56C16-C780-44B8-8C0C-63737C1C06F3", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9345DCEC-A026-40C8-A353-3A0469DC5DAA", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFF357BD-04F6-46FA-BB4D-8A7595449B74", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "603591D4-5826-42E6-A8B9-E6C3BAE781A2", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1546E74-1020-4F6F-B9CD-63BE041C73E7", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A48CA589-1D31-4F39-9F5D-9F28EB0D600F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65778A40-A33C-4035-8DE3-997D9FF5EE6C", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8C01641-19E6-45FC-A359-93C9643ED565", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DE57A25-5323-4D1B-BCD9-B68302068F12", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "070D7935-38B0-4568-8DA9-A8E28786A803", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F21AC1A-62EC-4575-9655-F215C283B276", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D355124B-6687-4D10-9277-7E39A3737E74", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F259F652-2F84-4868-A68F-DF331F6B02FF", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CEAE751-6B97-4A64-A8CE-DD109E40E9C5", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28B7FD96-9F84-467F-A3F3-9AF0190CA63F", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A090DD-8C6A-4233-9E9C-6FB4A3B33FA0", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3279C13-02F8-4961-8D2D-A63B6B4FE12D", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2A87FF9-BD82-454D-AE01-DCE5317DE0FF", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A015D614-E5C0-4E29-8293-776BB1A94D10", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E65353E8-9949-4C4B-932C-667279130E33", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D484F828-5CFB-4A61-BF53-B9F28ACCF6EE", "versionEndExcluding": "2.5.0.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "162B0262-CE2C-4984-A6B1-B901E811B0CC", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D22DF022-C31A-495C-85A7-A2F8A16DC2EF", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "763299A3-D24A-4504-B2A4-E803407C8362", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "176FE80D-5199-4510-A7F1-01D3256450C7", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D142F8B0-8B67-4B97-B96A-52BFCEC3CE58", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "520D3C41-1125-4745-A513-A4612046DD40", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D993645B-4DB2-45BA-B7EF-C988A49CDC8A", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "819EBA57-903A-4F08-ABD0-3CB9ECB4A065", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE0A7B1C-66F8-41C5-B3E6-8255D22407B7", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6DC6B24-4789-44BB-B34B-904F5652C2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC073DFE-4D85-4B43-8BD2-C4EC7F0EA36E", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CD6C368-705C-4AA5-BFCE-63A6A411A800", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E93E5ACB-B4DC-4E10-BD6F-0BEACD024941", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B5EE74F-A8E1-4A75-8FD2-21230293809C", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D101025-42C2-46B1-BCE7-DAD2B6DE8141", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1E08B48-138B-441C-951D-44578A31F1ED", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8943AD9A-BA0C-4AD5-A35C-7FD82484719D", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EFD2C-E5BC-424E-9F00-4653C01981DA", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72AF1C2C-C190-4FBC-A468-0863CD5851FC", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A36AED-FFD3-446C-AB12-B3DDD6BBE243", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "538851E7-2DEB-43F9-B5ED-C696F925F00C", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B08BA07-5F4F-44F7-BD1E-3E8455430FDC", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8695118-0A83-4A7F-BDCD-18EB4C906545", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77D42182-0D2B-43C0-8BE2-EA6255A166CC", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53DAEEBD-7155-412F-A63D-0779217C3E33", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F51D0CC0-23A0-46D6-BDEB-BC15C3D8253D", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "412BBA1B-6C54-47D0-A4C3-F2AD2C580674", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E0258DD-37D0-4607-B29D-095700ADE63C", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7444A63-6739-4B01-A503-88E6B8AEACF8", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "143CE2F5-9BCD-4AEF-A04A-E645C67E8240", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA315213-2376-4C38-838A-5A9CFD6F5378", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B3579E5-7CF6-41F3-B6B1-3D820ACA7619", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68D7186B-319F-4F2F-B839-FE8466CBCA48", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54E0657A-6E4E-4B24-8D6B-ADFD67F864AE", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CF43FBA-9B58-4A89-A345-E2B7BD0A0432", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169C472-6BF7-45FF-A032-43AFD467EE18", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56924835-C5CE-4770-A5AD-62B421A0AF2E", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D2E5EC-C66D-4FDE-A0BD-FD86CCA7B478", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7EE83B8-8275-4677-A531-7E02B1D7ADD2", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAB35899-A2B7-4C61-A6F1-B602DD250010", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6CFAF51-B5E7-4553-BA3C-A348602FFB54", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E8F53E9-E466-4DEB-828F-57521E93831E", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C897D930-A028-4B61-8B13-B10412B5C4E5", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEF95CAA-EA21-487F-B519-9C171FB76DB1", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61ECF32F-D3ED-431D-B5AD-DB41F48DE6D5", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E90397B5-E99A-46CC-B477-2E467AC3133C", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2EC0AB5-2605-4B1A-AA8C-C1E16A9BB441", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65238A4D-3CFE-4CB5-BC92-BE79C2F1CCC0", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53CD4704-9DF7-4C82-9D91-2CA2A217B760", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03D002DA-1AC3-4648-8F70-899985A661DB", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3361C8-6A46-42FB-92B9-434E30C434DF", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1611DAC1-42B9-4844-B382-28175E92F17B", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0860456F-4527-45FD-BC45-1AA2D77ED782", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A06E69FB-69F8-48EB-96A5-BB8CCCCA7738", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA390EBD-EA03-41CF-8DC5-0E48B504F46C", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D2C109-1F37-4F56-A75C-B6FC48DCF590", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38724B36-783F-4BCB-B134-F32C941D5A50", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8305353E-DC47-4438-80E7-051625BAD735", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF317B7-DA9F-464A-968C-336D41254367", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A78E85E-62CE-4789-A75C-9144F7DCDDE8", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB46396-3A4D-4A47-90EA-225BE1676568", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CF7414-A410-42FF-A40A-040A390C760D", "versionEndExcluding": "1.4.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz basada en web de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz basada en web. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por el usuario mediante la interfaz basada en web del dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un enlace malicioso y luego acceda a una p\u00e1gina de interfaz web espec\u00edfica. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en navegador." } ], "id": "CVE-2019-12718", "lastModified": "2024-11-21T04:23:25.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-16T19:15:11.973", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-17 21:15
Modified
2024-11-21 04:37
Severity ?
4.7 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/109288 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/109288 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "2771C8A5-8074-4739-AD13-6A9613AD5F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "11F2791E-C3DA-4C03-AD22-3D297BE15A7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "32191D8C-732B-4A86-A7F5-39F86D489EFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDBFBE-A2D8-4153-8728-B460A645A61F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "32C00DEB-D048-4CD4-9FAC-452975E18A8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "C5BD4735-5291-430D-9D37-85C5CEA7BCFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "6459BD48-9D03-4869-9709-03E453BD0E7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "F36533AD-E2CC-4D44-B9AE-05597415E5C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "F55C1D18-343A-4961-8377-25509F709480", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "825A2B20-0C4F-4B41-84DE-5DD6E625672F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE3662-EFB4-415C-A276-33692A883B16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A6CA3661-3BF3-46AC-B2A5-75F9154F7342", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "7963297B-A97D-4704-9E5C-51311AC99AFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "54AF17F5-1579-441A-81CA-1A32106871B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "C9C9E514-5EF0-49FB-8D29-162231770292", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A59ACB01-F0DC-4EBA-A078-B7BE6390162F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "FFA8C7A2-1E90-4CFB-8780-A98B786562E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "F7637BBD-6D6C-4EB4-8F90-0A8DB62890A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "CAFAF764-7275-4E51-A2DD-E0BFEEEF51BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "C0F3D9E1-3663-47A7-9F32-2636084D2A7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B924994-14BD-43F7-A958-B9B6C581A331", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "C9ADCCA3-A32F-425A-9E1E-10703BA38D74", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "220CCE1B-C6A4-4F67-9A1B-2DA6CA7C2CA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "35D0E391-B0AD-4577-A1BD-B31179B41C6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "79624321-A683-4714-9F13-9FCAE4B4B604", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "282C7CA0-A341-4C64-A8C6-C390A70093E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "227DB561-5C81-4CA2-93A3-9F36E91A6C69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user\u0027s HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz web del software Cisco Small Business 200, 300 y 500 Series Switches podr\u00eda permitir que un atacante remoto no autenticado redirija a un usuario a una p\u00e1gina web maliciosa. La vulnerabilidad se debe a una validaci\u00f3n incorrecta de entradas de los par\u00e1metros en una petici\u00f3n HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad al interceptar la solicitud HTTP de un usuario y modificarla en una solicitud que haga que la interfaz web redirija al usuario a una URL maliciosa espec\u00edfica. Este tipo de vulnerabilidad se conoce como ataque de redirecci\u00f3n abierta y se usa en ataques de suplantaci\u00f3n de identidad que hacen que los usuarios visiten sin saberlo sitios maliciosos." } ], "id": "CVE-2019-1943", "lastModified": "2024-11-21T04:37:44.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-17T21:15:12.453", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109288" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-04 16:15
Modified
2024-11-21 06:23
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5351275-B6BB-4C0B-B6BE-04AD6B87DC89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22A38A8A-081E-4471-8A13-0AF6AB7339C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C879A7D2-34FC-4BF0-8845-CA358BED3B88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B28A1C-B891-4D1B-A91C-7DC88846F726", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C31245AB-ECAD-431D-90C5-C33D3F78B09B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E21B324D-F948-4373-A9FB-F07F56473774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EC313EB0-C812-4B77-B6EB-6E5D106CA1DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "61C7AA57-56B9-4C39-98FC-A9C72F9B2C60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "EB1E7DA8-4181-47C8-B86E-72DEA912DD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E942E2D0-C4AF-47C4-A9E6-3F26D66F9D1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E9F50236-E49B-4BE1-BC96-E3EB3997541B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "DEC94589-59F0-451D-AE0B-1A2610EC9F8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A6451DB3-575F-4E48-9839-083F00C35B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "8CB83A46-C1E5-4CF9-9615-41F3C315FC02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "735E92BB-E4D9-46B5-B9A3-A685934F456F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "17426691-ADB9-429C-8B37-A479C630B95A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AD5D6C94-CF45-4252-9F26-C41E5030F001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "5C95827B-4219-4EB8-B54C-21C9E852F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "531206F5-A601-4A31-A3F3-0CBF4AF3B329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "58F68741-2F9B-4438-8B6E-2E76E42032F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "11835FD0-2107-4FBE-8027-FBA60817E624", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "D34720E3-5EE5-4C3F-98C1-B288CAF4C114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "11F581CD-52CF-495B-A1B9-346D47C7F7D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "931F3413-96F3-41DC-81FA-00B7047AA100", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F700BC4-035F-4509-B882-AFFEBA0B178A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "AF68BBFD-A14A-48DB-89F3-50F90D308D97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "A100F872-E7F4-4188-AB44-594F9612F478", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "BE30BE52-B04C-467D-9A5E-8F71B4C2F3CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "6FAB4ACB-70C8-4BD2-9E1A-D5DCE06B3FBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "261CC970-0D09-4E85-A063-A68CE026B593", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "E5EDC0B7-F004-4841-B848-E653E4FF044B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "797B03EC-8CE9-41C9-B77A-975A7664CC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "ADEFD297-FDDC-4677-B52E-7FACA67FA71D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.11.02:*:*:*:*:*:*:*", "matchCriteriaId": "ED0F2E5D-7A5A-4205-8F88-1DC6F593E713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E985C1-0BBE-4128-B110-7CBFF141D020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DF942EB-8373-4202-BC95-AC82C0565A6B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C1696B-C2EC-4D3A-9E6F-C59485C4DF7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1280ABD-C15B-42BF-AF72-B54C3BCBAF83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6F067F1-7F5F-4887-8B6F-BE8F35C4B8CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "626915FA-9BBA-4488-944A-8B4AB12F875C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de los switches inteligentes Cisco Small Business 200 Series, los switches gestionados Cisco Small Business 300 Series y los switches gestionados apilables Cisco Small Business 500 Series podr\u00eda permitir a un atacante remoto no autenticado inutilizar la interfaz de administraci\u00f3n basada en la web, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad es debido a que no son comprobados correctamente las peticiones HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP dise\u00f1ada a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una redirecci\u00f3n no v\u00e1lida permanente para las peticiones enviadas a la interfaz de administraci\u00f3n basada en la web del dispositivo, resultando en una condici\u00f3n de DoS" } ], "id": "CVE-2021-40127", "lastModified": "2024-11-21T06:23:38.027", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-04T16:15:09.643", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFFD881A-0D7E-401A-A69C-397E476E5DAD", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0F973-8476-42C9-B05B-48BE34717CAC", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54584C84-2CE8-4E73-B58D-AFB3C8D7659E", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E94525F-05C6-4425-8C8B-8671F1EDA9A7", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05645288-92E8-4F21-80CB-39A5A31954F2", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8799EC0E-350D-43A6-AE31-68629A637308", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C73BA34-BDF4-4242-AEB5-D867BC5EF599", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F55B1A59-BF4A-4E96-82D6-2B604681E027", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6282A87C-6F2B-41F8-A53F-44DDDC437995", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EE55BC7-8F28-47BB-8296-101B13E78C9A", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B22E45C4-B481-41AF-9D8F-DE705481DEF5", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCE3A235-E171-4682-AE90-F6D8FEAD96E8", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D0E9ED8-92E6-4492-9FE0-CD2A851970DA", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAFD98F-6F06-4C95-9A32-FC9EEC894059", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D11848C-C027-41A4-8A6C-4E0E36AC2278", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CCB2E7D-E353-4F68-90B9-D0FE415E5E29", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1080FE18-DD22-4E9B-A518-47026A848345", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC6B9FEA-A8DC-42FF-A435-A953AC185E3D", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25E8F696-D786-42CD-95C5-DE1E340A93B3", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7FB78FF-A40D-45AD-8BF3-6277ED7A369F", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92CFC5EA-BCB0-435E-960C-70C9171A54F3", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB84F179-6915-4FBE-ABBE-D4F346A332E1", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CE16A79-8601-46A7-B0B1-B9E7FE70CEAF", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "288A47B7-0EC5-4484-A0E4-F1B8AEC2CCC4", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67F78985-6305-4EB7-BD66-40EAB975F141", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95756431-612D-422D-9DBC-61AF92F75432", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63DE059C-D45B-4B1D-9DEC-908028E6099F", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8340CD09-7FB0-425B-8262-C812D7B720DF", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "387B7C97-5AFE-4C32-93D4-B7236A0B70ED", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63159E4B-585F-40E9-981D-E2D569701DAE", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F983A1DC-807D-428E-A1E0-AB19BC2B46D1", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78D19883-F410-45F5-A04E-06A011D7666B", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9470B5BE-AB7B-4A33-8A22-D5C86E842FC7", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA285AC8-75E0-44FC-984C-DF8996F69817", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C8ADDA4-FD34-4AA4-8D92-0EFF279B669E", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E2340CE-7F99-460A-AFD9-4AEEDDE5D789", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1CDA64-2C97-4CC8-87A2-5FC6F23FC4DE", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE76CBB-9934-467F-B918-4C3D6C1C33E3", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1623541C-0521-432F-B7A0-0983C781255E", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "026C8FB0-AF69-4F7A-8068-8E92D1BCB73E", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A7B907-DC97-4D58-9F72-063D8A526994", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97DB2F1A-B496-4CB6-B632-7B4A2C3CB14D", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B288B192-45F7-4475-8DC6-A9E3D01E2028", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62AA8CE-38C4-4079-97E9-A8FF23D236E6", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B6A5155-624E-4848-835F-FBCBE22E8F31", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59300A75-74B3-4411-8380-FDA62C8E826A", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E77ADA37-65DA-49CC-85FE-03D242AC2878", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9EF02C4-A24D-4A91-AD41-9F7D3C3CA2BC", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C621580-9656-4F3A-BF2D-6E97E9C1C943", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F79C2721-B554-4C77-A423-0EC44A07C2BB", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "222A1120-8920-4445-AC3A-3A2752141D61", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F28F657-840F-4EF3-BB3C-6BE2EFA33FB0", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00E8213A-63DB-4649-948A-478D094641BC", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF65FD90-F675-4056-8BA7-F20876B89E99", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12D4A95A-9758-4EFC-B690-E6A5D4CF260E", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD243F82-C133-48B5-A55C-448C9B6C2012", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52237767-13BF-4B22-8322-4FA4DD9D56B3", "versionEndExcluding": "2.5.0.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CB6AD6-2606-4A19-844D-5CAA971E83C2", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9816F54-BA63-473B-BB4B-711722302517", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E8557B1-BF19-4BD7-BB2B-4EE1A55E09CE", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E68B7353-2034-4D3E-BBD0-CC8FFF55FA55", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B053CCA-DF85-4885-915F-5724D961514A", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7ADAE2-5201-476C-9B9E-3EA0AADEB047", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "425EF609-83E3-44D5-88B2-81C873BB1C96", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7DDB5A-7D50-4C4B-950A-9DC77B342109", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6257E14D-BFE3-44E8-AB83-1B2096BDD87F", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F47DF59-773A-4BED-A548-BAD4E1612039", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92C177B6-2FA8-486E-BDC9-8B69CE2C71A0", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD56251F-EE7A-4605-A9A0-180D0B68D67D", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54629245-E4CC-42D6-9AE5-6682EB673C91", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0E9BF06-F9F3-47F1-9ACF-1C9875D34A2D", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBCA2440-DD3B-4C6F-BC21-1C65A53948E7", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CB6AD6-2606-4A19-844D-5CAA971E83C2", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9816F54-BA63-473B-BB4B-711722302517", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E8557B1-BF19-4BD7-BB2B-4EE1A55E09CE", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E68B7353-2034-4D3E-BBD0-CC8FFF55FA55", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B053CCA-DF85-4885-915F-5724D961514A", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7ADAE2-5201-476C-9B9E-3EA0AADEB047", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "425EF609-83E3-44D5-88B2-81C873BB1C96", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7DDB5A-7D50-4C4B-950A-9DC77B342109", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6257E14D-BFE3-44E8-AB83-1B2096BDD87F", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F47DF59-773A-4BED-A548-BAD4E1612039", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92C177B6-2FA8-486E-BDC9-8B69CE2C71A0", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD56251F-EE7A-4605-A9A0-180D0B68D67D", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54629245-E4CC-42D6-9AE5-6682EB673C91", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0E9BF06-F9F3-47F1-9ACF-1C9875D34A2D", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBCA2440-DD3B-4C6F-BC21-1C65A53948E7", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "770E9D23-8366-494F-93DB-2C15CEECDB03", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03FE59DE-65A4-4969-B189-9EB1FDAC17C6", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3F54F-853D-48DA-85D7-08F7251CADEC", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33D30A71-3EC8-436E-B6EB-8F85749FBBB0", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7032AF3-FDDA-4AAB-843C-6EE000CA9BC9", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44DA72EA-B8A7-438F-8E41-FB1F667AE5A8", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAD56B74-D6FA-459E-A108-6AD1275EFE8A", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13877EA7-43C4-4171-A26A-372396950EC2", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "350B373C-2C15-4763-95AD-FE7639CB0DEC", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50C8BE22-9B68-4185-934E-14931A75D182", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8E76F73-8ABB-4EB5-AEF2-74363650C84C", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30C76BE1-CD8C-483D-B4BD-BCA99CCC8B2F", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748EC0D2-60BC-4813-9FF4-7FAD6F242053", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F32367C8-388C-4A99-9731-16AF03CDB74C", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3B1BC2-EF01-4AD6-922A-9A4377974CA0", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA354974-6FB9-4AFD-8118-194E12AA109C", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BE8486-4F69-42C1-B5D1-1A75B9743231", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8337FB8-A6B5-49A1-B356-BE2BB3E4F3CF", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB1E6D8C-3DDB-43F0-BB04-0990AF1D4C2C", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE4209B3-FABB-47D2-9E4B-DAD439E3E91D", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FC7CC-1D31-4328-8F0A-9D73313FB261", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05D941DA-1558-4801-AC54-3BEC8A0F188A", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1EA0FFC-79DD-4050-9014-1A4EB234BB11", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC1B84F1-DD45-483C-9C1B-9A0491D8B2CA", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79CA958-9B1E-4B6D-9555-B893971CFD54", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00B7EBA0-1F05-4D4B-B2EC-F0EC6AE692BF", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF1D6CB-5064-430A-8988-56FAA6DE63C9", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2470A37-530B-456E-8FE5-4D8274304135", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3233C427-6F16-4577-976D-DE1A36A5B5C4", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EDC52AE-0844-46E7-ACB4-BB32D70E1C4A", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30223810-0822-4406-A781-A5049A4B6A5D", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33D14D5-7F36-4374-B92D-60F63DE9DA80", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B909EAA7-2B09-4AE1-8248-E32EC5CE11F8", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB386177-1DE3-4223-A217-74060E907787", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "205F2AF5-BA3C-4516-8B2C-88D9B897C6F4", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "928646A6-E198-4F88-B084-F00987B9F8E6", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75416DF8-226E-48DE-9216-0458DC6D1E55", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4B6200-3241-4FAD-8AB7-7E19856BF032", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EBED6F3-7B67-416F-A368-0519B42E7AF9", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A0D55-30E1-4D7A-ADE6-1F55608AD932", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "129DA779-09A6-4A3B-AB4B-25FC3C3EBC1C", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53751D31-23FE-49D6-938D-638149553758", "versionEndExcluding": "1.4.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files." }, { "lang": "es", "value": "Una vulnerabilidad en la Interfaz de Usuario web de Cisco Small Business Switches, podr\u00eda permitir a un atacante remoto no autenticado acceder a informaci\u00f3n confidencial del dispositivo.\u0026#xa0;La vulnerabilidad se presenta porque el software carece de controles de autenticaci\u00f3n apropiados para la informaci\u00f3n accesible desde la Interfaz de Usuario web.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP maliciosa hacia la interfaz de usuario web de un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial del dispositivo, que incluye archivos de configuraci\u00f3n" } ], "id": "CVE-2019-15993", "lastModified": "2024-11-21T04:29:53.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-23T01:15:13.410", "references": [ { "source": "psirt@cisco.com", "url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-17 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BF693F4-E085-43E1-81CB-F4365E173FFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3521F951-DA4C-48C9-8FD0-CAD4328E61F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37654BAD-A965-4680-9496-2527CC20574F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EDCF275-D322-4551-B072-CAE85047759A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BB3C8A5-8918-48A9-A8FB-12F0E694247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64ED9-F8FD-4C26-82F9-C4D84D14681D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBA145A-98C6-494C-A488-37122AC62C91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B94C85-629E-4911-B55E-53B6D86BC603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A0D3C4-B134-4709-BA6B-1D376A7D4696", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "027E1D98-A934-47E3-A3CA-813C3E581A58", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8407005-2954-482E-A2BE-64FA81DB8C82", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B91858-B62B-4EB8-86F4-E16A2FE2E38E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04F3DD74-DD70-4154-854D-C125A3065735", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14F3604E-EC92-48A8-A0BB-AC848AF188CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E933E3-12C4-48A7-80A7-BD3C6D99F21E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4310B268-A950-4214-806B-2E2C5C85546C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BF81119-6931-4423-BC37-085C772165DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8915A14C-5C9F-443C-95CA-A3DBBEFAE8C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A655D736-2E6B-4DA0-878D-419B17DB6C9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E4C8F8F-F914-48A7-B47B-2F1EFE8F7605", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44E170A-2F71-4112-9793-BDE10341A485", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EADF9B5-CE67-4148-8AF1-200CB1087A28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD46C00E-FFF2-4881-A86C-87676DA895D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33C6CC27-465A-4B48-B910-4AE704296BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "505929A2-38FD-4DE7-A545-17304C97F5C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1AF8D7A-0138-4369-8134-369CE4F5B83C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF16C957-3898-40E8-89E8-68C4D11A7438", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9646CE32-97B0-4708-B9DC-54419898E5D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "465EF5CA-3AD1-4727-B245-3C69E28E02F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CEFE6F1-4F0F-4A61-A9D2-AF2EF6A4BCB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0E6130F-046E-4F43-9B33-1E2F78DA838D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4BE80B2-F273-4336-897B-C67DCB8E2DFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82562C7C-8DC8-4D67-8FB8-DFC3CD034127", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7033CCD4-DA36-4D4F-AC61-FBDA9D14ADB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16458FAB-82F2-4BF7-834E-EAF425A55122", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1A52FA3-1EBE-4A7B-99A5-99A4162EBC02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41B604A-8C7E-4A17-9D99-19638DE0C043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAFDC3D1-2390-4D1B-B6BC-95757E56721F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E56D27-ED97-4D92-9EE9-37CFF223ACFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E070A80E-D5DD-49BC-B1CC-54C37D89F1FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B01E0FF-0EA1-4337-B95C-59E51A54E4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82F86D1D-95DD-456C-BE0B-DF85FAF7E8F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FAB4B2-F4F7-43CE-B82A-5053CE65C658", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03407954-9170-46D1-BBFA-3479B51D9A87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C06422E-173D-4650-A560-137E7B00763E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E3E9EF2-9588-4EF4-AE3A-CCF10A962C87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF9BB1CC-974C-4739-BC55-AFAA8C27B16D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E9723D-912C-4EAC-905D-C2AA20092F6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C25D316-9228-41E8-96CA-8CBF38855701", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D863273-1BE8-4AC0-ABFF-58EF1597D363", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B2D902-C7E7-4EF7-B633-9FC9AA473010", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C115DA7-6CEF-49EF-8E24-FA0A7DD050A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE0090D8-7AB4-4BA7-A969-1C0C6B368B09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "219B048E-B61B-4C50-B345-FD25696CB764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10E69DC4-C09F-4178-8037-29406F79BFF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB77511-93E3-43D8-8D32-AABE27ADFB08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7534A5E0-742E-414D-BDC5-259D39159BB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BCF751-3356-41C4-811E-B7CF56E63A7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AFA3D3-E364-46B6-A93F-04A75CB77558", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F13F3D35-4661-4E09-A970-F6AEC950ACC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B78DFA9D-05FD-404C-8546-86DC2A7F306C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D26514DC-FD8C-416B-AA7E-F62208F5E5E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBF6EC3F-225D-48B5-82C6-9559BE0B653F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC3DF9-71EE-4503-92E2-74D19DD8478B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "582CD84B-C24D-43DD-8000-CA9BD41771DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "257121AF-7D08-40FC-BC75-BA0E29246B16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "731E458C-B7AA-437A-AA22-023AE746044A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBE8C75E-5727-43AA-8F27-9368C60C1DD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "375B4C7B-4A60-4CCD-8656-C674D734FA10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2537192-BED2-4B18-966C-E10F155ED1CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2E280C1-B685-4813-A8B9-4A654FA3222B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D82748-7475-4E94-928B-05D45D7AD2F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5B39775-5AAF-4A0B-83E7-D6102D75C404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22A19260-8730-42E6-B7B4-DCC7BEA6274F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA9482-67E6-4E6B-8A45-24908BB40C1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3012AD17-508E-4860-897B-4F9644BFEC03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BE2BCF-A130-449B-B50B-0D5414DDD18C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30AA113A-4967-4554-8AE6-BA51C9A5F2C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected." }, { "lang": "es", "value": "Una vulnerabilidad en el motor de procesamiento de paquetes IPv6 de Cisco Small Business Smart and Managed Switches podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente del tr\u00e1fico IPv6 entrante. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete IPv6 dise\u00f1ado por medio de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar un reinicio inesperado del conmutador, conllevando a una condici\u00f3n de DoS. Esta vulnerabilidad es espec\u00edfica del tr\u00e1fico IPv6. El tr\u00e1fico IPv4 no est\u00e1 afectado." } ], "id": "CVE-2020-3363", "lastModified": "2024-11-21T05:30:52.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-17T18:15:12.587", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-03 17:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577A47E0-77CA-4DCF-AC10-F47DD7DE8C48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBE35256-0B87-4C1D-915A-E34DAA6772E1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64AED79F-7321-4A57-80AD-7B186AC1904D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C729335-3E5C-43DB-9DB5-300A1C2DA4F3", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83310D13-587A-400F-B1B6-58D9C3220D3C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACE36DF5-EAE8-4930-AD40-1CBCF5D7ED53", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04107C2D-731C-4F63-942B-725A478EDF2A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "842B9A79-D574-41EB-8027-9038FC0E3F64", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12D57C7-8A54-4124-8E1E-37F03A5C985C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53AD939F-CD46-4127-BED2-C90D9219367F", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "548424AC-7644-4FEE-88A7-24C7E7F814A1", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2203C60A-0069-4F5A-AAD7-BA99A45DC779", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AF4A347-A9EC-443D-8244-9CCF18E857C3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCE45D7A-2724-45C3-A41F-9E38D37932C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E99E251-5F53-4968-85BC-A0EFA7891917", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09CCE38-1E2B-4BD1-96B0-535A51BD698E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BB8399A-B1AD-4201-9A85-AE332F8D46DC", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C37F67-8132-4A19-A702-7B6C60F9897E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13DBAA04-CE95-4549-9457-4900AB3D1A8E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4490464D-BAC7-489C-A2C1-4971AC8B7F54", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF659800-49AB-4416-B6F3-FF5F8F41C72B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAC0FB45-E376-4EFF-8866-2E42494296BB", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3623874C-7E67-40AF-A094-499E1857D048", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E417898B-0AE2-45AD-944A-9EE6D806CD8E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23356E45-B7B2-4A32-B821-D1C53D3FD6A5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDB5362A-022F-42F8-AD49-C2557243B972", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1175B98B-DFE3-4A48-A453-80FA643EBD35", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "991DA0D7-7142-4EC1-8991-195D2F5D0B31", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BC93E7A-6055-49E6-AEC7-F819113D902E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "645781BB-E440-42F9-9369-495366447B30", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BEF14AB-1A92-4FAE-B8AB-CE08BD23626B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F7555C1-DDEB-4E50-A19E-A76FB9E38DE9", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13ED47EC-DF8C-492D-915E-37D81B29F6AA", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F03E3B0-B272-419F-AB11-8D4D932D26B7", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C774AC-3F98-4DB2-B022-1CA00461293D", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE4FCF7D-2669-4615-A35A-8FEE133DC93C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F48B631-F727-497F-B139-54174DA63EAA", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC5D6EC8-B27C-412C-9A52-DB596BA4A4F3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7463A23D-539F-485E-8C99-75D7F2E6A19F", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC1C0736-BDCF-4028-899E-985DFBABB6D6", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FB911D6-F531-42DC-9537-B7DF20A09CE3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C758954B-BCD6-4C06-844E-C0FB1626D024", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57E6CA13-6231-4722-90DD-4495F4C10E0B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DEB673A-B39B-49DC-9CF0-D1E636068E75", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "107F975E-EEE4-4F40-BDCF-9E5F86528982", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91AF6345-7D52-4467-9864-C63F888613AF", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B2FC17-14E6-41C9-B3B2-D8791EB1379C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28EC4789-E1D6-47A4-A92B-0F6196688159", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4A9255C-6562-4DBC-A42C-D5D74FA948C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52978A27-0D0E-4DB8-B988-D5E6F608DC1B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38531BE0-3233-44F9-9F91-74A479CA27C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EB87CFE-3151-4473-A006-258325F2E079", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default." }, { "lang": "es", "value": "Una vulnerabilidad en el proceso de identificaci\u00f3n de Secure Shell (SSH) del programa Cisco Small Business Switches podr\u00eda permitir a un atacante omitir la autorizaci\u00f3n de certificado del lado del cliente y volver a la autorizaci\u00f3n de contrase\u00f1a. La vulnerabilidad se presenta porque OpenSSH maneja de manera inapropiada el proceso de identificaci\u00f3n. Un atacante podr\u00eda atacar esta vulnerabilidad al intentar conectarse al dispositivo por medio de SSH. Una operaci\u00f3n con exito podr\u00eda permitir al atacante acceder a la configuraci\u00f3n como un usuario administrativo si no se cambian las credenciales por defecto. No existen soluciones disponibles; sin embargo, si la identificaci\u00f3n de certificado del lado del cliente est\u00e1 habilitada, desact\u00edvela y use la autorizaci\u00f3n de contrase\u00f1a segura. La autentorizaci\u00f3n del certificado del lado del cliente est\u00e1 deshabilitada por defecto." } ], "id": "CVE-2019-1859", "lastModified": "2024-11-21T04:37:32.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-03T17:29:01.500", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-05 14:29
Modified
2024-11-21 03:38
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business 300 Series Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerability exists because the affected management interface performs insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or allow the attacker to access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "4086928C-5FAA-4666-B196-D01F4DC60995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AD2C77D-0840-44D6-8C10-F98333D54A72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B23DC360-E8CA-4172-9C2C-9C79F778BEE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6C971AD-C4A0-45F2-8A25-E1EBE85E4B92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "53647218-5BAD-44FE-BBC6-92B7C210E629", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "016EB658-23E1-49FB-91F1-1487FED3F050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "CFD883E1-24F2-4AE6-903A-53C0EC505EF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D263DAF0-9532-45ED-AD68-8A8F7643A54D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "37EE1347-EA34-49F1-8D2D-8D601E4F3604", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "160A84A0-9512-44CB-8CF8-84AE179B7D9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "A16F71B7-2F58-4E2D-951F-D3DE33A3608C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "DD2D9C39-8959-421F-B59E-E58004EB0AB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F3D2D25C-94A3-437D-883D-8726EE2CDE88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A237D24-4AD9-4DC0-A224-151C7B4EB073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3779CB09-8250-46AC-9CF1-ED3572998313", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB7C5A7F-3CD8-4B59-B15A-BCB0F6CB7BC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0B93DCA7-A8CE-4A18-853E-E2BCB5C80B30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "099DB9BA-04C3-49E6-876B-F13D76015A36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F2A9D62E-0F67-4434-826E-5E12F4AAF029", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3C1B10D0-08DD-49B6-ABD5-D53C6D1321B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B0E00067-5651-4972-96F3-B88109F62438", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A4E5C86-DBE6-47D7-853E-67E1C41A8416", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2DB5AA50-AFD7-4336-BDA2-8BCE638EC700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E3157DF-CC63-44B3-AA95-31360238D232", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "65EBA3F8-91FE-4630-8A9D-288C7F9A4D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "CF6756C9-E556-4EE8-8889-0C068664B181", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "6AA459CA-4D3E-4524-BA33-5D5A32A768E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerability exists because the affected management interface performs insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or allow the attacker to access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de gesti\u00f3n web de Cisco Small Business 300 Series Managed Switches podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de la interfaz de un sistema afectado. Esta vulnerabilidad existe porque la interfaz de gesti\u00f3n afectada realiza validaciones insuficientes de la entrada proporcionada por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace malicioso. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute c\u00f3digo script arbitrario en el contexto de la interfaz afectada o que acceda a informaci\u00f3n sensible del navegador." } ], "id": "CVE-2018-0465", "lastModified": "2024-11-21T03:38:17.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-05T14:29:04.357", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-300-switch-xss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-300-switch-xss" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-08 17:29
Modified
2024-11-21 03:50
Severity ?
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/105873 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105873 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BCF751-3356-41C4-811E-B7CF56E63A7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AFA3D3-E364-46B6-A93F-04A75CB77558", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F13F3D35-4661-4E09-A970-F6AEC950ACC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B78DFA9D-05FD-404C-8546-86DC2A7F306C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D26514DC-FD8C-416B-AA7E-F62208F5E5E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBF6EC3F-225D-48B5-82C6-9559BE0B653F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC3DF9-71EE-4503-92E2-74D19DD8478B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "582CD84B-C24D-43DD-8000-CA9BD41771DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "257121AF-7D08-40FC-BC75-BA0E29246B16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "731E458C-B7AA-437A-AA22-023AE746044A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBE8C75E-5727-43AA-8F27-9368C60C1DD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "375B4C7B-4A60-4CCD-8656-C674D734FA10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2537192-BED2-4B18-966C-E10F155ED1CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2E280C1-B685-4813-A8B9-4A654FA3222B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D82748-7475-4E94-928B-05D45D7AD2F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5B39775-5AAF-4A0B-83E7-D6102D75C404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22A19260-8730-42E6-B7B4-DCC7BEA6274F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA9482-67E6-4E6B-8A45-24908BB40C1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3012AD17-508E-4860-897B-4F9644BFEC03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BE2BCF-A130-449B-B50B-0D5414DDD18C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30AA113A-4967-4554-8AE6-BA51C9A5F2C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BF693F4-E085-43E1-81CB-F4365E173FFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3521F951-DA4C-48C9-8FD0-CAD4328E61F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37654BAD-A965-4680-9496-2527CC20574F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EDCF275-D322-4551-B072-CAE85047759A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BB3C8A5-8918-48A9-A8FB-12F0E694247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64ED9-F8FD-4C26-82F9-C4D84D14681D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBA145A-98C6-494C-A488-37122AC62C91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B94C85-629E-4911-B55E-53B6D86BC603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A0D3C4-B134-4709-BA6B-1D376A7D4696", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "027E1D98-A934-47E3-A3CA-813C3E581A58", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8407005-2954-482E-A2BE-64FA81DB8C82", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B91858-B62B-4EB8-86F4-E16A2FE2E38E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04F3DD74-DD70-4154-854D-C125A3065735", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14F3604E-EC92-48A8-A0BB-AC848AF188CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E933E3-12C4-48A7-80A7-BD3C6D99F21E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4310B268-A950-4214-806B-2E2C5C85546C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BF81119-6931-4423-BC37-085C772165DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8915A14C-5C9F-443C-95CA-A3DBBEFAE8C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A655D736-2E6B-4DA0-878D-419B17DB6C9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E4C8F8F-F914-48A7-B47B-2F1EFE8F7605", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44E170A-2F71-4112-9793-BDE10341A485", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EADF9B5-CE67-4148-8AF1-200CB1087A28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD46C00E-FFF2-4881-A86C-87676DA895D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33C6CC27-465A-4B48-B910-4AE704296BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "505929A2-38FD-4DE7-A545-17304C97F5C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1AF8D7A-0138-4369-8134-369CE4F5B83C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF16C957-3898-40E8-89E8-68C4D11A7438", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9646CE32-97B0-4708-B9DC-54419898E5D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "465EF5CA-3AD1-4727-B245-3C69E28E02F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CEFE6F1-4F0F-4A61-A9D2-AF2EF6A4BCB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0E6130F-046E-4F43-9B33-1E2F78DA838D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4BE80B2-F273-4336-897B-C67DCB8E2DFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82562C7C-8DC8-4D67-8FB8-DFC3CD034127", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7033CCD4-DA36-4D4F-AC61-FBDA9D14ADB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16458FAB-82F2-4BF7-834E-EAF425A55122", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1A52FA3-1EBE-4A7B-99A5-99A4162EBC02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41B604A-8C7E-4A17-9D99-19638DE0C043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAFDC3D1-2390-4D1B-B6BC-95757E56721F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E56D27-ED97-4D92-9EE9-37CFF223ACFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E070A80E-D5DD-49BC-B1CC-54C37D89F1FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B01E0FF-0EA1-4337-B95C-59E51A54E4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82F86D1D-95DD-456C-BE0B-DF85FAF7E8F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FAB4B2-F4F7-43CE-B82A-5053CE65C658", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03407954-9170-46D1-BBFA-3479B51D9A87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C06422E-173D-4650-A560-137E7B00763E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E3E9EF2-9588-4EF4-AE3A-CCF10A962C87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF9BB1CC-974C-4739-BC55-AFAA8C27B16D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E9723D-912C-4EAC-905D-C2AA20092F6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C25D316-9228-41E8-96CA-8CBF38855701", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D863273-1BE8-4AC0-ABFF-58EF1597D363", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B2D902-C7E7-4EF7-B633-9FC9AA473010", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C115DA7-6CEF-49EF-8E24-FA0A7DD050A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE0090D8-7AB4-4BA7-A969-1C0C6B368B09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "219B048E-B61B-4C50-B345-FD25696CB764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10E69DC4-C09F-4178-8037-29406F79BFF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB77511-93E3-43D8-8D32-AABE27ADFB08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7534A5E0-742E-414D-BDC5-259D39159BB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en el software Cisco Small Business Switches podr\u00eda permitir que un atacante remoto no autenticado omita el mecanismo de autenticaci\u00f3n de usuarios de un dispositivo afectado. La vulnerabilidad existe porque, en determinadas circunstancias, el software afectado habilita una cuenta de usuario privilegiado sin notificar a los administradores del sistema. Un atacante podr\u00eda explotar esta vulnerabilidad usando esta cuenta para iniciar sesi\u00f3n en un dispositivo afectado y ejecutar comandos con derechos de administrador total. Cisco no ha publicado ninguna actualizaci\u00f3n de software que solucione esta vulnerabilidad. Este aviso se actualizar\u00e1 con informaci\u00f3n de software solucionado cuando dicho software est\u00e9 disponible. Existe una alternativa para solucionar esta vulnerabilidad." } ], "id": "CVE-2018-15439", "lastModified": "2024-11-21T03:50:48.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-08T17:29:00.607", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105873" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-30 19:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "913C13B4-1DBE-4989-B0BB-DF98897FCB0C", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73DBA59E-454F-4047-8229-4163548C40E9", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AB09E0C-26AD-4344-B511-33166FCA2654", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4143302F-BC6A-43F5-ABF2-4C34A9926DA5", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3542CF67-9EC1-465E-A027-E528D57F3E6D", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2118EEF3-6050-428E-A683-19C3CFBB5957", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79050CF-2334-4E74-BF39-159EF2EAA2C9", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A2FFC2D-5F7D-415A-AD19-F888F411CDE9", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE0C4BA6-C783-4479-83E6-E733F10B4CEC", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5253E3FB-4EDC-4566-A53A-D23243F1A618", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBD2064E-67B8-41B5-9E7F-2853881D5B91", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "746232C8-1731-4383-9B7F-AE306B0D8ED2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6711BB2-0E02-4F29-B82F-31DC3C5B6472", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A92ED0C-1C29-464C-9AB9-650C27DC1D1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-24fp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9B67FE2-45E5-41BD-9954-9EE7AC1A48C5", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE97AF68-E2A3-43B4-A54E-B6F5C530C06E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A62D02-19EA-4AFE-949A-7B776EE8B359", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0FBDDCC-42CB-4B0A-BC65-005BC1677359", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8EDB69-BBF2-48C5-9EFF-FDB9B58F9065", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA41DFC5-2407-49B5-BC90-B7A626AA4985", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "122506C3-E848-4826-B46E-05789782D28B", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EA9AACB-C646-4EDB-B3D3-CF96CDEE3B5D", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D955B2B5-F80D-45C3-A0F8-35D783E7BF61", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A332420-EB7F-4B20-B2B9-8147F24C1517", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15C0EB2-5C3E-4279-87BB-5CDD8B91ACA5", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F3986C-A315-40CB-85B4-248BFB0436A4", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0969FBF-7DAA-418F-98D2-31328FF90EA9", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB02739B-4E0B-4869-A83A-A6F98262450A", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D295B6B-CE09-4A82-83E2-09CD72FCA5DF", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F15B764-20D9-4FD6-9C1C-1BE5686DCE64", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FFBAD78-2EA5-4761-88CF-F4B3CE706CC5", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D75EF89-F11E-4BA9-A1EB-93C453705346", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "418669F3-11B6-413E-8EA3-1ABA483DCDDB", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "396B9D23-7000-4091-A002-4B10491EACE2", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8772BF05-2A4A-4C23-A462-E65F9843380B", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79B0F309-FE7E-4C94-B393-F65CC14A4F8E", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F47A9-F003-49C1-BEAF-2FC7D2DC6444", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7076F29-3D54-4E14-A6F3-951E0ACA6626", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74C501D0-81E9-467C-AC0B-7744CF633EE3", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABBADD7C-F31E-4A52-B29E-9F5E2A94997C", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA4F8E34-8689-4A8B-8D02-61553E97BF9C", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F31ED06-28DA-4F7A-BFDE-109891031718", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E98492C-F2F8-4693-8A36-8BC0F164181F", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "589B2598-467D-4150-A66D-8CF755AA733B", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50EB8581-AB06-4726-833A-2B6E190AA1FF", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5198A2BD-A507-40AF-B809-A81F3C207C78", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E495F60D-807C-4E2E-8984-C66EAB0CFA35", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD7344FA-BB28-4B8D-9371-6B2DEA2D11EE", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D63B37-1DF9-4CCC-9CDE-C1060C51CEDA", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "269BD5D3-E576-472D-9DD5-E7DC2077A771", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16890902-4067-44F2-962D-4904DDF0A66A", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FF510FB-CE1C-48B6-AB9E-F411F294F007", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "113B94DD-9BD7-467D-8D18-18C18AD12178", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C17E695-C644-460C-BB5A-02CD88F4E23D", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CC861B5-8192-48BB-9ACA-9F397A63192D", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B309A935-C909-42EF-9FE4-B797F5E03C87", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ACE4061-57E2-45BD-A4B5-448EFC339EB7", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2C46A-C53C-4A6D-A6B6-483BDF85D58D", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09201E8-6ABC-4E0D-806F-3261EC8F855A", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF580D79-4A1A-4E57-B415-A72EE993FB1B", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DAB9C2-9F4A-4755-854D-85B76844DA25", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8488796-F37B-4ACE-9F0A-90DBBD635F5A", "versionEndExcluding": "1.3.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18" }, { "lang": "es", "value": "Una vulnerabilidad en la Interfaz de Usuario Web de Cisco Small Business Switches, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n inapropiada de las peticiones enviadas hacia la interfaz web. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n maliciosa hacia la interfaz web de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n DoS. Esta vulnerabilidad afecta a las versiones de firmware anteriores a 1.3.7.18." } ], "id": "CVE-2020-3147", "lastModified": "2024-11-21T05:30:25.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-30T19:15:11.790", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-02 05:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F8416CC-0A4C-4227-951B-14929E401A66", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22965552-683D-4811-A69C-4B9FB87CC21C", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C5A0ACA-1654-4A32-940C-80105E747813", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F908C393-B84F-4045-93DA-23037EA29A93", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F700C7FC-7C34-4DFA-860B-BD6BDB259BD0", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "733E125D-6914-4338-BA82-B885D31A0A32", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DE74203-4041-4F19-8E39-37581C24E6CC", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "041E477D-0D38-49F1-AB5E-BB42F9AD3DCB", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C181FD66-2C64-4DEB-A8F2-3DDF66B87447", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BD04A21-F225-41D8-9A56-A350169432BE", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24477345-8D97-44F4-98AA-8959059D7D76", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D313EAD-CE05-4D48-A50C-98737206DFA1", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25C1B05A-2F05-4CBD-8648-FD4BF0FBDEE3", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6176441-3DC9-44FD-9751-F2AE9FD39BF3", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B71B9C17-B708-42BD-82EA-5C19B5B93B65", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1007E9-2301-46D6-929B-1752D2704BFF", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A455130-06D1-4AA7-9F1F-4F3B09B2C9E0", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E67A14-67D7-446A-B16F-4546C64BAACE", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC1A0BA-EA0F-4D31-B440-D15A4D5737AB", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B537A5CB-FE88-462B-85F5-7FEC51C244EF", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "433B833B-1E17-4FA2-A938-7AFE08AED85F", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67D32F03-1816-4C15-8BC1-97F51A9097A5", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C69A281-25E0-4B17-A610-19A2DC13AAE1", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44DAA587-1673-40D8-826B-BADAD2602330", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AB3A7F3-91C2-46E7-8889-70720FC366AC", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53509E24-885E-4D5A-89F8-94D124EE2F9A", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0815568-7FBC-4794-9023-C5BDF6A2DA94", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03700689-2A5E-4155-AE32-62519DAF662C", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DF7CF9E-510E-4F18-90F3-2244A30832E9", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAE29E35-04DD-4BCD-966F-4023F2392E05", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "251A7270-0814-4EC1-8FAB-FAB58408626B", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC548F72-CD1E-4A77-BD94-71380A7CF7B3", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "409AD45A-3F8E-4AF6-80E8-4D6449AC6EEF", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCDD945F-E5BE-41B7-BB2F-F5657B2DA8E3", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB233D2A-10E4-47BD-980C-E2047113F3D0", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A6CB98E-0CDF-4AEE-8681-30A3DD796B3A", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8092743-980D-442F-958D-A804FF7D9F77", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42433AA1-CAE4-43C0-AE87-8CD406BB7BFD", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95BBEB9F-6574-4B6D-ACC3-EA0E1C3E6A7D", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE960080-B027-4ED8-A99D-D03A6487D1CC", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20AA691F-D07D-4484-8024-C03B935A8AB6", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F99C124E-2554-413A-99A7-D2BD86F24C65", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A00ABB6-25AC-41C9-BF5F-5B88CA69DB74", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D2CA1B6-6520-4658-AAD0-AB8997E61097", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C58BAD66-6CAB-4021-8466-F4C8AEE3E66B", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21BA4FB4-965E-448F-8049-74C9E0F5E13C", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD221AC-9D30-4B8E-9D15-DBE4DCB5AF72", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A38B9E3-B6D4-4218-BA85-993853A2943B", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F861ED41-C075-4908-8862-C80410F26D17", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCABDD82-A432-4E28-AB6C-9150102F89BD", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D14CC5-370E-4822-92ED-B5E0D43E326D", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC4F63DF-1762-45D5-B157-44812D65F8BE", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99157B79-030F-4C22-BC2C-658CB6F7E929", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FF0B49-0054-4FB1-A882-7ACEFF08FFFE", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FBF38D-F5CD-4966-BE01-F91DEFA72E70", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F94A2C0E-D26A-44CA-8B90-05A9C281F16B", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23F9A26A-4226-4050-BEB4-0D716B1F676B", "versionEndExcluding": "2.5.5.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5351275-B6BB-4C0B-B6BE-04AD6B87DC89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22A38A8A-081E-4471-8A13-0AF6AB7339C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C879A7D2-34FC-4BF0-8845-CA358BED3B88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B28A1C-B891-4D1B-A91C-7DC88846F726", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C31245AB-ECAD-431D-90C5-C33D3F78B09B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BCF751-3356-41C4-811E-B7CF56E63A7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AFA3D3-E364-46B6-A93F-04A75CB77558", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F13F3D35-4661-4E09-A970-F6AEC950ACC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B78DFA9D-05FD-404C-8546-86DC2A7F306C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D26514DC-FD8C-416B-AA7E-F62208F5E5E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBF6EC3F-225D-48B5-82C6-9559BE0B653F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC3DF9-71EE-4503-92E2-74D19DD8478B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "582CD84B-C24D-43DD-8000-CA9BD41771DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "257121AF-7D08-40FC-BC75-BA0E29246B16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "731E458C-B7AA-437A-AA22-023AE746044A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBE8C75E-5727-43AA-8F27-9368C60C1DD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "375B4C7B-4A60-4CCD-8656-C674D734FA10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2537192-BED2-4B18-966C-E10F155ED1CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2E280C1-B685-4813-A8B9-4A654FA3222B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D82748-7475-4E94-928B-05D45D7AD2F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5B39775-5AAF-4A0B-83E7-D6102D75C404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22A19260-8730-42E6-B7B4-DCC7BEA6274F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA9482-67E6-4E6B-8A45-24908BB40C1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3012AD17-508E-4860-897B-4F9644BFEC03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BE2BCF-A130-449B-B50B-0D5414DDD18C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30AA113A-4967-4554-8AE6-BA51C9A5F2C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user." }, { "lang": "es", "value": "Una vulnerabilidad en la administraci\u00f3n de la sesi\u00f3n para la interfaz basada en web de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado vencer las protecciones de autenticaci\u00f3n y conseguir acceso no autorizado a la interfaz de administraci\u00f3n. El atacante podr\u00eda obtener los privilegios de la cuenta de sesi\u00f3n secuestrada, que podr\u00eda incluir privilegios de administrador en el dispositivo. La vulnerabilidad es debido al uso de una generaci\u00f3n de entrop\u00eda d\u00e9bil para los valores del identificador de sesi\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad para determinar un identificador de sesi\u00f3n actual mediante un ataque de fuerza bruta y reutilizar ese identificador de sesi\u00f3n para asumir una sesi\u00f3n en curso. De esta manera, un atacante podr\u00eda tomar acciones dentro de la interfaz de administraci\u00f3n con privilegios hasta el nivel del usuario administrativo" } ], "id": "CVE-2020-3297", "lastModified": "2024-11-21T05:30:45.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-02T05:15:11.260", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-18 06:29
Modified
2024-11-21 03:09
Severity ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/102718 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102718 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62A8CD6-FD0B-4F93-A521-A574470806AA", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E28746B-DDAF-48C3-98D2-6DF02F10402B", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DB647C6-4F49-44B3-B5DC-1CB4B2808809", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D42E184D-0BB9-4632-A910-7223EF5846DC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D9AE8D4-8324-47DE-8A1B-002F04791CF4", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D3EAE27-6D3D-427E-B94B-E65FF60A477F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FA8309E-218A-4EBB-86CB-53568F87AE03", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18D13620-A801-4837-A2D9-D8BB5EC67C8E", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC203EBF-AADC-4536-A3A8-8FAD7EF49F66", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3250E1B1-3478-4089-8D4D-210CF5382396", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C40A90E-B0CC-4713-858A-CE98FA73A59A", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA0176C1-1AC1-4A05-B2C7-E1E4C76A61FD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59267A4D-846E-4E07-9158-7AB7AE6A8754", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCFACA27-EBA0-44A2-ADDB-16701EE476A5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CB0A209-D8D2-48E9-9A83-A4EFFD5EBDC0", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE38A4A5-81FC-4A79-8E8F-F6B288ED2283", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B981B6EB-AAEE-4B4E-86B1-005E11D1DB30", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D496D2D-84AF-47A4-BC5E-607C7E5E6DF6", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A38D74-522F-4001-97C8-8F3D33AC9DC8", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03436FAE-7FBF-4C4A-9EE4-3FD94316ED25", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6961B4DB-F152-43A6-9440-6655BCAD379F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E912AC1-B82E-406B-8480-720223F2FD74", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "438E02A3-D177-4476-80DA-0C95C783B161", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA6AE9A9-61D3-4CE4-B1D3-029734397956", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "142DCA4A-57D6-48C0-ADD9-749E9B8464D1", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7CEC74C-D5FE-45CA-83A1-15F771958993", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46470295-0C82-4D37-A9CE-722CAEED6008", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9162932E-4570-4A6C-8634-1D756EF42C7F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAB16572-975A-473E-8EDA-757BE49CDFCF", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "662D1FD6-5DBB-4DC3-A11E-00AA87A3DF19", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F584E122-98B8-4F6F-92F1-4A6C83C3B934", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6B8D73B-BEF3-4006-9ED4-5C8F98B479D9", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96925BF-73FC-454B-9B00-632EB2A1E1E5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "752F1EF7-FA82-4B8E-B8B6-5939270DB705", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB932882-F8F9-44ED-A673-9A07211D5D7F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "857756BD-B680-43EE-9FDB-F5FD56D7A1AC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28F46707-41BD-4118-933D-1FF48045880E", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37DB9ADA-FCCF-407A-A18D-530FF0815551", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4B89E91-97B0-47EE-BC1E-D0A0098C8C92", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50CB4BA4-E815-4506-A6FE-21B1F41EEEDF", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "6812853E-C083-4841-A467-91130ED194BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "666E6BEC-32C1-4361-AF78-3B5739D38378", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "26A7AB18-C75F-4C63-9132-140EFC46E3C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5803FD62-086B-4316-BDFC-331156C208FD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B70093-E9FE-410A-973E-CE847F08F43A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4015A3F7-5706-40E9-84AD-A81D9205B2CE", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3503F68-CF84-468E-9A40-9F98875DD1C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98827546-CA39-4D4E-9C0F-D3B020BE08D2", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B42742-D701-4AE9-A833-189FB6708FC9", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3E798EF-99B0-4D76-B0F2-6FB9499FCF8B", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A289E57-D99E-4A61-BEE3-91A43F156030", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A415AFE8-B965-45B7-B01F-E3F8F79F8EDD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD23FB5D-9A7F-4A03-A269-A6FE486677D5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61764001-8BCD-4D43-9324-9ADED2F2890C", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A61B9373-76C9-4EFC-B4AF-EB8833310750", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58E2227C-F7C1-424A-B5C5-5C4BDF052521", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2BDD45-5A8B-494A-A9BE-597ABD9B16D7", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8982BA5-8ABD-4235-8D24-90F4C949C583", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDB31016-63A8-4436-A4A5-605E79071A71", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BC8B43A-27FD-4188-9247-11796701FF22", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F611F78-9D39-4970-B43B-D634203D6F2A", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49E144D2-93D7-4F19-8C96-50CB5BA0FBCE", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0D8F03D-511A-42FC-8A89-0C69A4BC0D13", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA114A88-569D-4B50-A908-2CD30EF15D74", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC685D61-7F81-4877-A5A4-E1AE0D2298BC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE87339F-65FC-4BFA-9C5F-6E1E7CA08E2F", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D46DE3-626E-407D-A5CA-B05E32F1B6C8", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F600F290-8723-42BE-9E6A-587132ECE8F4", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E85841-5E82-4D66-B7E7-C8AE8A11E1BB", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BCAC9EF-CCF9-4BD2-AADD-A3F48B95B52C", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F214C861-ECCF-4734-9866-E237F5CC5D53", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6791A301-2164-4F44-8B03-91B96BE2CDD0", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03FF785B-6274-4092-9E43-3396F4FE8CAD", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C38DF13-3C4A-4CB5-9205-74670FC0C8E5", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E523C7-CF2B-430B-829E-D803AA1CDE62", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADCEE83B-369D-4F38-AE97-9ABD11A20DAA", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54B4BEBC-BC5E-4003-9B34-E2A6896F509D", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF964C5-4CA9-4D81-B60E-2BEDEF47E571", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30B99E44-30D9-4AF1-97D5-EA2DCAF6E825", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41879534-43D0-476A-931C-2E8B187D456E", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "975C54C6-B3B0-4C89-9C35-05BBEF6E75C7", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1DC345D-BEB3-409A-803C-D7FE72EFB073", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23C93EF7-4851-4E4E-A600-BAD62254D707", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D89D488C-0582-4338-8848-EEA8DB6AC2DC", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00F8E3E4-55D4-43A7-8564-167A2A32DED1", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BA5FC05-98F4-4A8C-91E0-703784F5970C", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55371BC-B4A3-4E56-AE2E-63BD3D5835D2", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7C44E0B-336B-466C-85E0-F92626456CED", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E12126E-E0E3-479D-B5FA-578683C70050", "versionEndExcluding": "1.4.9.4", "versionStartIncluding": "1.4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637." }, { "lang": "es", "value": "Una vulnerabilidad en el framework web de Cisco Small Business Managed Switches Software podr\u00eda permitir que un atacante remoto sin autenticar lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de par\u00e1metros que se pasan al servidor web del sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad convenciendo a un usuario de que acceda a un enlace malicioso o interceptando e inyectando c\u00f3digo en una petici\u00f3n de usuario. Un exploit con \u00e9xito podr\u00eda permitir que el atacante ejecute c\u00f3digo script arbitrario en el contexto de la interfaz web afectada o que acceda a informaci\u00f3n sensible del navegador. Esta vulnerabilidad afecta a los siguientes productos de Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches y Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637." } ], "id": "CVE-2017-12307", "lastModified": "2024-11-21T03:09:16.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-18T06:29:00.207", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102718" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-01 20:29
Modified
2024-11-21 03:38
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87330.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/104948 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104948 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95F84EE8-5FE2-4BFE-91B1-5AB98FB7145E", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E128AD-0ED3-4325-A8AB-99DBE8737F06", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "119B8DCA-72CA-4B79-82C0-F05620ECFB78", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DCF7541-B413-431C-82E5-E12AE5D992AC", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97BCF797-3FF4-40A1-B8C2-4080E09640AE", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4AABF11-47DB-4DC4-9B90-2D3258EAFAAD", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE86224-1883-4A5A-A49F-09FF51884472", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "479DB0EF-166A-4C0D-9659-6F2891C88A18", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B519DA0-9C2D-4FE9-BD8C-5C94AFFF701E", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87087817-E993-4D58-864C-6FFCFB924AD3", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D876D181-2F4C-447A-988A-BF585E5F38D9", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56AF6213-3930-4B0D-9A15-54C8027CF9FD", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B13747A0-FE84-4DED-923E-AA65BB4B5BC9", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3885C4C4-579F-49C7-840F-256BC8FB3E34", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E313896-91C7-480B-AB3C-A4837F9AC363", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF86F983-F89C-4ED4-A092-981577DDC737", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA5D51-86C8-44CF-A100-2F5B2FD378FF", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C2F8BDA-9360-418A-BEEF-E41A5CD345AB", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89C0F0FC-C706-4D8B-B396-12BCBE2FF6C0", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E97DA27-09CF-4292-A91A-ADBA744D1C8F", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDDC3FFD-1161-41B7-843C-83D07D0FF567", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "980AFDC6-9A11-46FC-9570-431CC9667D98", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4A5FB60-E017-4F83-9809-052CFBF1B335", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D273D904-0FAC-43A5-A89F-1FDE2952A615", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21AD5E5A-CAEA-4259-BEF4-CF060FC80F77", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B1C306-BC99-4A86-919A-3A72FA94686B", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A429813-D852-4E17-BD52-FEC0C1ADDD23", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AEAE0B-80A0-49E8-9206-454D3B4EB5B2", "versionEndIncluding": "1.4.7.06", "versionStartIncluding": "1.4.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87330." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de gesti\u00f3n web de Cisco Small Business 300 Series (Sx300) Managed Switches podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de dicha interfaz en un dispositivo afectado. La vulnerabilidad se debe a la validaci\u00f3n insuficiente de entrada de datos de parte del usuario en la interfaz de gesti\u00f3n web de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace manipulado. Un exploit con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz o que pueda acceder a informaci\u00f3n sensible del navegador. Cisco Bug IDs: CSCvi87330." } ], "id": "CVE-2018-0408", "lastModified": "2024-11-21T03:38:09.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-01T20:29:00.433", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104948" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-21 04:37
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en el procesador de paquetes de entrada de Secure Sockets Layer (SSL) de los Switches Administrados de las series 200, 300 y 500 de Cisco Small Business, podr\u00eda permitir a un atacante remoto no autenticado causar una corrupci\u00f3n de memoria de un dispositivo afectado. La vulnerabilidad es debido a la comprobaci\u00f3n inapropiada de los paquetes HTTPS. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete HTTPS malformado hacia la interfaz web de administraci\u00f3n del dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2019-1892", "lastModified": "2024-11-21T04:37:37.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-06T02:15:11.293", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-16 00:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/108344 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108344 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device." }, { "lang": "es", "value": "Una vulnerabilidad en las interacciones entre las funciones DHCP y TFTP para Cisco Small Business 300 Series (Sx300) Managed Switches, podr\u00eda permitir que un atacante remoto no autenticado cause que el dispositivo tenga una disminuci\u00f3n sobre la memoria del sistema, que a su vez podr\u00eda generar una recarga inesperada de el dispositivo resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el dispositivo afectado. La vulnerabilidad se debe a un error al liberar la memoria del sistema cuando una solicitud DHCP inesperada es recibida. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete DHCP creado para el dispositivo de destino. Un aprovechamiento exitoso podr\u00eda permitir al atacante provocar una recarga inesperada del dispositivo." } ], "id": "CVE-2019-1814", "lastModified": "2024-11-21T04:37:26.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-16T00:29:00.260", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108344" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-0465 (GCVE-0-2018-0465)
Vulnerability from cvelistv5
Published
2018-10-05 14:00
Modified
2024-11-26 14:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Small Business 300 Series Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerability exists because the affected management interface performs insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or allow the attacker to access sensitive, browser-based information.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:11.141Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181003 Cisco Small Business 300 Series Managed Switches Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-300-switch-xss" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-25T18:48:24.993394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:39:19.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerability exists because the affected management interface performs insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or allow the attacker to access sensitive, browser-based information." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T13:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20181003 Cisco Small Business 300 Series Managed Switches Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-300-switch-xss" } ], "source": { "advisory": "cisco-sa-20181003-300-switch-xss", "defect": [ [ "CSCvj58239" ] ], "discovery": "UNKNOWN" }, "title": "Cisco Small Business 300 Series Managed Switches Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2018-10-03T16:00:00-0500", "ID": "CVE-2018-0465", "STATE": "PUBLIC", "TITLE": "Cisco Small Business 300 Series Managed Switches Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerability exists because the affected management interface performs insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or allow the attacker to access sensitive, browser-based information." } ] }, "impact": { "cvss": { "baseScore": "6.1", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20181003 Cisco Small Business 300 Series Managed Switches Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-300-switch-xss" } ] }, "source": { "advisory": "cisco-sa-20181003-300-switch-xss", "defect": [ [ "CSCvj58239" ] ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0465", "datePublished": "2018-10-05T14:00:00Z", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-26T14:39:19.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1943 (GCVE-0-2019-1943)
Vulnerability from cvelistv5
Published
2019-07-17 20:30
Modified
2024-11-21 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: 1.3.7.18 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:51.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190717 Cisco Small Business Series Switches Open Redirect Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect" }, { "name": "109288", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109288" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1943", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:57:41.930515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:18:29.649Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.3.7.18" } ] } ], "datePublic": "2019-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user\u0027s HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-19T07:06:03", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190717 Cisco Small Business Series Switches Open Redirect Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect" }, { "name": "109288", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109288" } ], "source": { "advisory": "cisco-sa-20190717-sbss-redirect", "defect": [ [ "CSCvp23218" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches Open Redirect Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-17T16:00:00-0700", "ID": "CVE-2019-1943", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches Open Redirect Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_value": "1.3.7.18" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user\u0027s HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.7", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601" } ] } ] }, "references": { "reference_data": [ { "name": "20190717 Cisco Small Business Series Switches Open Redirect Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect" }, { "name": "109288", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109288" } ] }, "source": { "advisory": "cisco-sa-20190717-sbss-redirect", "defect": [ [ "CSCvp23218" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1943", "datePublished": "2019-07-17T20:30:16.400115Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:18:29.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1892 (GCVE-0-2019-1892)
Vulnerability from cvelistv5
Published
2019-07-06 01:15
Modified
2024-11-19 19:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: unspecified < 1.4.10.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:50.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1892", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:47.263777Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:03:39.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-06T01:15:12", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ], "source": { "advisory": "cisco-sa-20190703-sbss-memcorrupt", "defect": [ [ "CSCvp43390" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches Memory Corruption Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1892", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches Memory Corruption Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ] }, "source": { "advisory": "cisco-sa-20190703-sbss-memcorrupt", "defect": [ [ "CSCvp43390" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1892", "datePublished": "2019-07-06T01:15:12.767702Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:03:39.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1814 (GCVE-0-2019-1814)
Vulnerability from cvelistv5
Published
2019-05-15 23:45
Modified
2024-11-21 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: 1.4.0.88 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190515 Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp" }, { "name": "108344", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108344" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1814", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:31.696603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:25:40.906Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.4.0.88" } ] } ], "datePublic": "2019-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-16T13:06:32", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190515 Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp" }, { "name": "108344", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108344" } ], "source": { "advisory": "cisco-sa-20190515-sb300sms-dhcp", "defect": [ [ "CSCvn17215" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-15T16:00:00-0700", "ID": "CVE-2019-1814", "STATE": "PUBLIC", "TITLE": "Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "version_value": "1.4.0.88" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.8", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "20190515 Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp" }, { "name": "108344", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108344" } ] }, "source": { "advisory": "cisco-sa-20190515-sb300sms-dhcp", "defect": [ [ "CSCvn17215" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1814", "datePublished": "2019-05-15T23:45:15.298126Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:25:40.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3496 (GCVE-0-2020-3496)
Vulnerability from cvelistv5
Published
2020-08-26 16:15
Modified
2024-11-13 18:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:54.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3496", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:13.563970Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:12:35.608Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 250 Series Smart Switches Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-26T16:15:54", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW" } ], "source": { "advisory": "cisco-sa-sbss-ipv6-dos-tsgqbffW", "defect": [ [ "CSCvt45826" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-08-19T16:00:00", "ID": "CVE-2020-3496", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 250 Series Smart Switches Software", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW" } ] }, "source": { "advisory": "cisco-sa-sbss-ipv6-dos-tsgqbffW", "defect": [ [ "CSCvt45826" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3496", "datePublished": "2020-08-26T16:15:54.968033Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T18:12:35.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34739 (GCVE-0-2021-34739)
Vulnerability from cvelistv5
Published
2021-11-04 15:40
Modified
2024-11-07 21:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business Smart and Managed Switches |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34739", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:42:41.130667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:43:18.199Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business Smart and Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-04T15:40:23", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5" } ], "source": { "advisory": "cisco-sa-smb-switches-tokens-UzwpR4e5", "defect": [ [ "CSCvx48953", "CSCvx48962", "CSCvx52310" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches Session Credentials Replay Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-11-03T16:00:00", "ID": "CVE-2021-34739", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches Session Credentials Replay Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business Smart and Managed Switches", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-613" } ] } ] }, "references": { "reference_data": [ { "name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5" } ] }, "source": { "advisory": "cisco-sa-smb-switches-tokens-UzwpR4e5", "defect": [ [ "CSCvx48953", "CSCvx48962", "CSCvx52310" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34739", "datePublished": "2021-11-04T15:40:23.357489Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:43:18.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12718 (GCVE-0-2019-12718)
Vulnerability from cvelistv5
Published
2019-10-16 18:36
Modified
2024-11-21 19:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 200 Series Smart Switches |
Version: unspecified < n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:54.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-12718", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:56:14.761626Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:08:32.647Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 200 Series Smart Switches", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-16T18:36:30", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss" } ], "source": { "advisory": "cisco-sa-20191016-sbss-xss", "defect": [ [ "CSCvo28159", "CSCvp35688" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-10-16T16:00:00-0700", "ID": "CVE-2019-12718", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 200 Series Smart Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.1", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss" } ] }, "source": { "advisory": "cisco-sa-20191016-sbss-xss", "defect": [ [ "CSCvo28159", "CSCvp35688" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-12718", "datePublished": "2019-10-16T18:36:30.481193Z", "dateReserved": "2019-06-04T00:00:00", "dateUpdated": "2024-11-21T19:08:32.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40127 (GCVE-0-2021-40127)
Vulnerability from cvelistv5
Published
2021-11-04 15:30
Modified
2024-11-07 21:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business Smart and Managed Switches |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211103 Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-40127", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:44:20.432997Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:45:08.555Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business Smart and Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-04T15:30:11", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211103 Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8" } ], "source": { "advisory": "cisco-sa-smb-switches-web-dos-xMyFFkt8", "defect": [ [ "CSCvz62174" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-11-03T16:00:00", "ID": "CVE-2021-40127", "STATE": "PUBLIC", "TITLE": "Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business Smart and Managed Switches", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20211103 Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8" } ] }, "source": { "advisory": "cisco-sa-smb-switches-web-dos-xMyFFkt8", "defect": [ [ "CSCvz62174" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-40127", "datePublished": "2021-11-04T15:30:11.944802Z", "dateReserved": "2021-08-25T00:00:00", "dateUpdated": "2024-11-07T21:45:08.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20188 (GCVE-0-2023-20188)
Vulnerability from cvelistv5
Published
2023-06-28 00:00
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-87 - Improper Neutralization of Alternate XSS Syntax
Summary
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.
Cisco has not released software updates to address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business Smart and Managed Switches |
Version: 1.0.0.16 Version: 1.0.0.19 Version: 1.0.0.27 Version: 1.0.1.0 Version: 1.0.2.0 Version: 1.0.3.3 Version: 1.0.4.5 Version: 1.0.5.1 Version: 1.0.6.2 Version: 1.0.7.4 Version: 1.0.8.3 Version: 1.1.0.72 Version: 1.1.0.73 Version: 1.1.1.8 Version: 1.1.2.0 Version: 1.2.0.97 Version: 1.2.5.70 Version: 1.2.7.76 Version: 1.2.9.44 Version: 1.3.0.59 Version: 1.3.0.62 Version: 1.3.2.2 Version: 1.3.5.58 Version: 1.3.7.18 Version: 1.4.0.88 Version: 1.4.1.03 Version: 1.4.10.06 Version: 1.4.11.02 Version: 1.4.11.04 Version: 1.4.11.5 Version: 1.4.2.04 Version: 1.4.5.02 Version: 1.4.7.05 Version: 1.4.7.06 Version: 1.4.8.06 Version: 1.4.9.04 Version: 1.4.9.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-smb-sxss-OPYJZUmE", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-sxss-OPYJZUmE" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Small Business Smart and Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.0.16" }, { "status": "affected", "version": "1.0.0.19" }, { "status": "affected", "version": "1.0.0.27" }, { "status": "affected", "version": "1.0.1.0" }, { "status": "affected", "version": "1.0.2.0" }, { "status": "affected", "version": "1.0.3.3" }, { "status": "affected", "version": "1.0.4.5" }, { "status": "affected", "version": "1.0.5.1" }, { "status": "affected", "version": "1.0.6.2" }, { "status": "affected", "version": "1.0.7.4" }, { "status": "affected", "version": "1.0.8.3" }, { "status": "affected", "version": "1.1.0.72" }, { "status": "affected", "version": "1.1.0.73" }, { "status": "affected", "version": "1.1.1.8" }, { "status": "affected", "version": "1.1.2.0" }, { "status": "affected", "version": "1.2.0.97" }, { "status": "affected", "version": "1.2.5.70" }, { "status": "affected", "version": "1.2.7.76" }, { "status": "affected", "version": "1.2.9.44" }, { "status": "affected", "version": "1.3.0.59" }, { "status": "affected", "version": "1.3.0.62" }, { "status": "affected", "version": "1.3.2.2" }, { "status": "affected", "version": "1.3.5.58" }, { "status": "affected", "version": "1.3.7.18" }, { "status": "affected", "version": "1.4.0.88" }, { "status": "affected", "version": "1.4.1.03" }, { "status": "affected", "version": "1.4.10.06" }, { "status": "affected", "version": "1.4.11.02" }, { "status": "affected", "version": "1.4.11.04" }, { "status": "affected", "version": "1.4.11.5" }, { "status": "affected", "version": "1.4.2.04" }, { "status": "affected", "version": "1.4.5.02" }, { "status": "affected", "version": "1.4.7.05" }, { "status": "affected", "version": "1.4.7.06" }, { "status": "affected", "version": "1.4.8.06" }, { "status": "affected", "version": "1.4.9.04" }, { "status": "affected", "version": "1.4.9.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.\r\n\r Cisco has not released software updates to address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-87", "description": "Improper Neutralization of Alternate XSS Syntax", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:53.077Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-smb-sxss-OPYJZUmE", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-sxss-OPYJZUmE" } ], "source": { "advisory": "cisco-sa-smb-sxss-OPYJZUmE", "defects": [ "CSCwf19896" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20188", "datePublished": "2023-06-28T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-08-02T09:05:35.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-15993 (GCVE-0-2019-15993)
Vulnerability from cvelistv5
Published
2020-09-23 00:26
Modified
2024-11-13 18:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200129 Cisco Small Business Switches Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15993", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:12:54.328085Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:03:35.211Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 250 Series Smart Switches Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-06T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200129 Cisco Small Business Switches Information Disclosure Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos" }, { "url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html" } ], "source": { "advisory": "cisco-sa-20200129-smlbus-switch-disclos", "defect": [ [ "CSCvr54104", "CSCvs68748" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Switches Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-15993", "datePublished": "2020-09-23T00:26:59.726175Z", "dateReserved": "2019-09-06T00:00:00", "dateUpdated": "2024-11-13T18:03:35.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1891 (GCVE-0-2019-1891)
Vulnerability from cvelistv5
Published
2019-07-06 01:15
Modified
2024-11-19 19:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: unspecified < 1.4.10.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1891", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:45.687480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:03:24.144Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-06T01:15:17", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ], "source": { "advisory": "cisco-sa-20190703-sbss-dos", "defect": [ [ "CSCvp43403", "CSCvp43417" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1891", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ] }, "source": { "advisory": "cisco-sa-20190703-sbss-dos", "defect": [ [ "CSCvp43403", "CSCvp43417" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1891", "datePublished": "2019-07-06T01:15:17.766702Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:03:24.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12636 (GCVE-0-2019-12636)
Vulnerability from cvelistv5
Published
2019-10-16 18:36
Modified
2024-11-21 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: unspecified < n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:39.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-12636", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:56:25.832896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:09:59.032Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 250 Series Smart Switches Software", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-16T18:36:26", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf" } ], "source": { "advisory": "cisco-sa-20191016-sbss-csrf", "defect": [ [ "CSCvo26471" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-10-16T16:00:00-0700", "ID": "CVE-2019-12636", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 250 Series Smart Switches Software", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf" } ] }, "source": { "advisory": "cisco-sa-20191016-sbss-csrf", "defect": [ [ "CSCvo26471" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-12636", "datePublished": "2019-10-16T18:36:26.757740Z", "dateReserved": "2019-06-04T00:00:00", "dateUpdated": "2024-11-21T19:09:59.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3363 (GCVE-0-2020-3363)
Vulnerability from cvelistv5
Published
2020-08-17 18:01
Modified
2024-11-13 18:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3363", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:14.723571Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:14:20.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 250 Series Smart Switches Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-17T18:01:25", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA" } ], "source": { "advisory": "cisco-sa-sbss-ipv6-dos-3bLk6vA", "defect": [ [ "CSCvt45834" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-08-05T16:00:00", "ID": "CVE-2020-3363", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 250 Series Smart Switches Software", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA" } ] }, "source": { "advisory": "cisco-sa-sbss-ipv6-dos-3bLk6vA", "defect": [ [ "CSCvt45834" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3363", "datePublished": "2020-08-17T18:01:25.633674Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T18:14:20.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12308 (GCVE-0-2017-12308)
Vulnerability from cvelistv5
Published
2018-01-18 06:00
Modified
2024-12-02 21:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Small Business 300 and 500 Series Managed Switches |
Version: Cisco Small Business 300 and 500 Series Managed Switches |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:55.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-12308", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T18:55:48.025220Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:46:39.725Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 and 500 Series Managed Switches", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Small Business 300 and 500 Series Managed Switches" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-113", "description": "CWE-113", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-18T05:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 and 500 Series Managed Switches", "version": { "version_data": [ { "version_value": "Cisco Small Business 300 and 500 Series Managed Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-113" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12308", "datePublished": "2018-01-18T06:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-12-02T21:46:39.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12307 (GCVE-0-2017-12307)
Vulnerability from cvelistv5
Published
2018-01-18 06:00
Modified
2024-12-02 21:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Small Business 300 and 500 Series Managed Switches |
Version: Cisco Small Business 300 and 500 Series Managed Switches |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:56.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1" }, { "name": "102718", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102718" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-12307", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T18:55:49.326877Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:46:55.055Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 and 500 Series Managed Switches", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Small Business 300 and 500 Series Managed Switches" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-18T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1" }, { "name": "102718", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 and 500 Series Managed Switches", "version": { "version_data": [ { "version_value": "Cisco Small Business 300 and 500 Series Managed Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1" }, { "name": "102718", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102718" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12307", "datePublished": "2018-01-18T06:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-12-02T21:46:55.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-0408 (GCVE-0-2018-0408)
Vulnerability from cvelistv5
Published
2018-08-01 20:00
Modified
2024-11-26 14:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87330.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Small Business 300 Series Managed Switches unknown |
Version: Cisco Small Business 300 Series Managed Switches unknown |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss" }, { "name": "104948", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104948" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0408", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-25T18:48:52.490826Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:49:41.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Small Business 300 Series Managed Switches unknown" } ] } ], "datePublic": "2018-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87330." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-03T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss" }, { "name": "104948", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104948" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches unknown", "version": { "version_data": [ { "version_value": "Cisco Small Business 300 Series Managed Switches unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87330." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss" }, { "name": "104948", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104948" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0408", "datePublished": "2018-08-01T20:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-26T14:49:41.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-6720 (GCVE-0-2017-6720)
Vulnerability from cvelistv5
Published
2017-09-21 05:00
Modified
2024-08-05 15:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Small Business Managed Switches |
Version: Cisco Small Business Managed Switches |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:16.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100933", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100933" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Small Business Managed Switches", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Small Business Managed Switches" } ] } ], "datePublic": "2017-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-22T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "100933", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100933" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business Managed Switches", "version": { "version_data": [ { "version_value": "Cisco Small Business Managed Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "100933", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100933" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6720", "datePublished": "2017-09-21T05:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:41:16.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3297 (GCVE-0-2020-3297)
Vulnerability from cvelistv5
Published
2020-07-02 04:20
Modified
2024-11-15 16:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 200 Series Smart Switches |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3297", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:28.822227Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:57:52.709Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 200 Series Smart Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-02T04:20:12", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY" } ], "source": { "advisory": "cisco-sa-sbswitch-session-JZAS5jnY", "defect": [ [ "CSCvt53117" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Smart and Managed Switches Session Management Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-07-01T16:00:00", "ID": "CVE-2020-3297", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Smart and Managed Switches Session Management Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 200 Series Smart Switches", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY" } ] }, "source": { "advisory": "cisco-sa-sbswitch-session-JZAS5jnY", "defect": [ [ "CSCvt53117" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3297", "datePublished": "2020-07-02T04:20:12.834539Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T16:57:52.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1806 (GCVE-0-2019-1806)
Vulnerability from cvelistv5
Published
2019-05-15 21:45
Modified
2024-11-21 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco 550X Series Stackable Managed Switches |
Version: unspecified < 1.4.10.6 Version: unspecified < 2.5.0.78 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "name": "108335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108335" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1806", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:33.464072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:26:01.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco 550X Series Stackable Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.5.0.78", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-16T06:06:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "name": "108335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108335" } ], "source": { "advisory": "cisco-sa-20190515-sb-snmpdos", "defect": [ [ "CSCvn49346", "CSCvn93730" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-15T16:00:00-0700", "ID": "CVE-2019-1806", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco 550X Series Stackable Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.5.0.78" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "name": "108335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108335" } ] }, "source": { "advisory": "cisco-sa-20190515-sb-snmpdos", "defect": [ [ "CSCvn49346", "CSCvn93730" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1806", "datePublished": "2019-05-15T21:45:15.994826Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:26:01.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3147 (GCVE-0-2020-3147)
Vulnerability from cvelistv5
Published
2020-01-29 22:10
Modified
2024-11-15 17:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: unspecified < 1.3.7.18 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:24:00.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3147", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:22:31.020821Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:43:27.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.3.7.18", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18" } ], "exploits": [ { "lang": "en", "value": "[CVE-2020-3147_ex]" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-29T22:10:12", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u" } ], "source": { "advisory": "cisco-sa-smlbus-switch-dos-R6VquS2u", "defect": [ [ "CSCvs79718", "CSCvs80055", "CSCvs80085" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Switches Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-01-29T16:00:00-0800", "ID": "CVE-2020-3147", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Switches Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.3.7.18" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18" } ] }, "exploit": [ { "lang": "en", "value": "[CVE-2020-3147_ex]" } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u" } ] }, "source": { "advisory": "cisco-sa-smlbus-switch-dos-R6VquS2u", "defect": [ [ "CSCvs79718", "CSCvs80055", "CSCvs80085" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3147", "datePublished": "2020-01-29T22:10:12.473801Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:43:27.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-15439 (GCVE-0-2018-15439)
Vulnerability from cvelistv5
Published
2018-11-08 17:00
Modified
2024-11-26 14:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 300 Series Managed Switches |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:54:03.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105873", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105873" }, { "name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-15439", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-25T18:54:41.981449Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:22:19.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-12T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "105873", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105873" }, { "name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc" } ], "source": { "advisory": "cisco-sa-20181107-sbsw-privacc", "defect": [ [ "CSCvk20713", "CSCvm11846" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Switches Privileged Access Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2018-11-07T16:00:00-0600", "ID": "CVE-2018-15439", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Switches Privileged Access Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "9.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-798" } ] } ] }, "references": { "reference_data": [ { "name": "105873", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105873" }, { "name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc" } ] }, "source": { "advisory": "cisco-sa-20181107-sbsw-privacc", "defect": [ [ "CSCvk20713", "CSCvm11846" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-15439", "datePublished": "2018-11-08T17:00:00Z", "dateReserved": "2018-08-17T00:00:00", "dateUpdated": "2024-11-26T14:22:19.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-0407 (GCVE-0-2018-0407)
Vulnerability from cvelistv5
Published
2018-08-01 20:00
Modified
2024-11-26 14:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87326.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Small Business 300 Series Managed Switches unknown |
Version: Cisco Small Business 300 Series Managed Switches unknown |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104947", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104947" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0407", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-25T18:48:53.815157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:49:54.152Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Small Business 300 Series Managed Switches unknown" } ] } ], "datePublic": "2018-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87326." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-03T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104947", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104947" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0407", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches unknown", "version": { "version_data": [ { "version_value": "Cisco Small Business 300 Series Managed Switches unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87326." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "104947", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104947" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0407", "datePublished": "2018-08-01T20:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-26T14:49:54.152Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1859 (GCVE-0-2019-1859)
Vulnerability from cvelistv5
Published
2019-05-03 16:40
Modified
2024-11-20 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business 200 Series Smart Switches |
Version: unspecified < 1.4.10.6 Version: unspecified < 2.5.0.78 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1859", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:10.283596Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:23:10.627Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 200 Series Smart Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.5.0.78", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-03T16:40:16", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv" } ], "source": { "advisory": "cisco-sa-20190501-scbv", "defect": [ [ "CSCvo28588", "CSCvp35704" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1859", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 200 Series Smart Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.5.0.78" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv" } ] }, "source": { "advisory": "cisco-sa-20190501-scbv", "defect": [ [ "CSCvo28588", "CSCvp35704" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1859", "datePublished": "2019-05-03T16:40:17.005739Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:23:10.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }