CVE-2025-20181 (GCVE-0-2025-20181)
Vulnerability from cvelistv5
Published
2025-05-07 17:35
Modified
2025-05-07 19:45
CWE
  • CWE-347 - Improper Verification of Cryptographic Signature
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Impacted products
Vendor Product Version
Cisco IOS Version: 15.0(1)XO1
Version: 15.0(1)XO
Version: 15.0(2)XO
Version: 15.0(1)EY
Version: 15.0(1)EY1
Version: 15.0(1)EY2
Version: 15.0(2)SE8
Version: 15.0(1)EX
Version: 15.0(2)EX
Version: 15.0(2)EX1
Version: 15.0(2)EX2
Version: 15.0(2)EX3
Version: 15.0(2)EX4
Version: 15.0(2)EX5
Version: 15.0(2)EX8
Version: 15.0(2a)EX5
Version: 15.0(2)EX10
Version: 15.0(2)EX11
Version: 15.0(2)EX13
Version: 15.0(2)EX12
Version: 15.2(2)E
Version: 15.2(3)E
Version: 15.2(2)E1
Version: 15.2(4)E
Version: 15.2(3)E1
Version: 15.2(2)E2
Version: 15.2(2a)E1
Version: 15.2(2)E3
Version: 15.2(2a)E2
Version: 15.2(3)E2
Version: 15.2(3a)E
Version: 15.2(3)E3
Version: 15.2(4)E1
Version: 15.2(2)E4
Version: 15.2(2)E5
Version: 15.2(4)E2
Version: 15.2(3)E4
Version: 15.2(5)E
Version: 15.2(4)E3
Version: 15.2(2)E6
Version: 15.2(5)E1
Version: 15.2(5b)E
Version: 15.2(2)E5a
Version: 15.2(2)E5b
Version: 15.2(4)E4
Version: 15.2(2)E7
Version: 15.2(5)E2
Version: 15.2(6)E
Version: 15.2(4)E5
Version: 15.2(2)E8
Version: 15.2(6)E0a
Version: 15.2(6)E1
Version: 15.2(6)E0c
Version: 15.2(4)E6
Version: 15.2(6)E2
Version: 15.2(2)E9
Version: 15.2(4)E7
Version: 15.2(7)E
Version: 15.2(2)E10
Version: 15.2(4)E8
Version: 15.2(6)E2a
Version: 15.2(6)E2b
Version: 15.2(7)E1
Version: 15.2(7)E0a
Version: 15.2(7)E0b
Version: 15.2(7)E0s
Version: 15.2(6)E3
Version: 15.2(4)E9
Version: 15.2(7)E2
Version: 15.2(7a)E0b
Version: 15.2(4)E10
Version: 15.2(7)E3
Version: 15.2(7)E1a
Version: 15.2(7b)E0b
Version: 15.2(7)E2a
Version: 15.2(4)E10a
Version: 15.2(7)E4
Version: 15.2(7)E3k
Version: 15.2(8)E
Version: 15.2(8)E1
Version: 15.2(7)E5
Version: 15.2(7)E6
Version: 15.2(8)E2
Version: 15.2(4)E10d
Version: 15.2(7)E7
Version: 15.2(8)E3
Version: 15.2(7)E8
Version: 15.2(8)E4
Version: 15.2(7)E9
Version: 15.2(8)E5
Version: 15.2(8)E6
Version: 15.2(7)E10
Version: 15.2(6)EB
Version: 15.2(4)EA7
Version: 15.2(4)EA8
Version: 15.2(4)EA9
Version: 15.2(4)EA9a
Version: 15.0(2)SQD
Version: 15.0(2)SQD1
Version: 15.0(2)SQD2
Version: 15.0(2)SQD3
Version: 15.0(2)SQD4
Version: 15.0(2)SQD5
Version: 15.0(2)SQD6
Version: 15.0(2)SQD7
Version: 15.0(2)SQD8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20181",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-07T18:56:17.739877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:45:02.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "15.0(1)XO1"
            },
            {
              "status": "affected",
              "version": "15.0(1)XO"
            },
            {
              "status": "affected",
              "version": "15.0(2)XO"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE8"
            },
            {
              "status": "affected",
              "version": "15.0(1)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX1"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX3"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX4"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX8"
            },
            {
              "status": "affected",
              "version": "15.0(2a)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX10"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX11"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX13"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX12"
            },
            {
              "status": "affected",
              "version": "15.2(2)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3a)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5"
            },
            {
              "status": "affected",
              "version": "15.2(4)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E4"
            },
            {
              "status": "affected",
              "version": "15.2(5)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E6"
            },
            {
              "status": "affected",
              "version": "15.2(5)E1"
            },
            {
              "status": "affected",
              "version": "15.2(5b)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5a"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E7"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2"
            },
            {
              "status": "affected",
              "version": "15.2(6)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E5"
            },
            {
              "status": "affected",
              "version": "15.2(2)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E1"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0c"
            },
            {
              "status": "affected",
              "version": "15.2(4)E6"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2)E9"
            },
            {
              "status": "affected",
              "version": "15.2(4)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E10"
            },
            {
              "status": "affected",
              "version": "15.2(4)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0s"
            },
            {
              "status": "affected",
              "version": "15.2(6)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E9"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2"
            },
            {
              "status": "affected",
              "version": "15.2(7a)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1a"
            },
            {
              "status": "affected",
              "version": "15.2(7b)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3k"
            },
            {
              "status": "affected",
              "version": "15.2(8)E"
            },
            {
              "status": "affected",
              "version": "15.2(8)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E5"
            },
            {
              "status": "affected",
              "version": "15.2(7)E6"
            },
            {
              "status": "affected",
              "version": "15.2(8)E2"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10d"
            },
            {
              "status": "affected",
              "version": "15.2(7)E7"
            },
            {
              "status": "affected",
              "version": "15.2(8)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E8"
            },
            {
              "status": "affected",
              "version": "15.2(8)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E9"
            },
            {
              "status": "affected",
              "version": "15.2(8)E5"
            },
            {
              "status": "affected",
              "version": "15.2(8)E6"
            },
            {
              "status": "affected",
              "version": "15.2(7)E10"
            },
            {
              "status": "affected",
              "version": "15.2(6)EB"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA7"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA8"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9a"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "cvssV3_0"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "Improper Verification of Cryptographic Signature",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-07T17:35:31.850Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
        }
      ],
      "source": {
        "advisory": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
        "defects": [
          "CSCvd75918"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20181",
    "datePublished": "2025-05-07T17:35:31.850Z",
    "dateReserved": "2024-10-10T19:15:13.225Z",
    "dateUpdated": "2025-05-07T19:45:02.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-20181\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-05-07T18:15:37.973\",\"lastModified\":\"2025-08-04T18:51:54.673\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\\r\\n\\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\\r\\n\\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189B0C7C-D794-43EB-A6C6-F29C4B9623A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28722F17-AF23-4435-AF9B-996798ACF2C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587450DF-77E4-4320-9191-383EBE5A6CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C965E814-7ABE-4C45-8EA8-B6818BC213F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4556022D-5B0C-4F7A-868C-9EC01F716D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7760B1FF-BC56-49F4-8020-439EA2F53AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49229E8B-19ED-4E5E-AA2E-F699C033F4A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A4AC61-4386-4218-91B7-6CE776D8050B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59403A6B-3488-4F81-BE3C-A06AF1731B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ABF12A-78BD-459D-BF53-065A56C385AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D15A929-0C2B-4C3D-99E4-0E7D46217216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D00EB0E-92D3-4C5B-B107-730B47BD6E01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF7F6A52-9AA9-4441-A137-7EE3470C155C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92CEEA13-0B40-4203-8BAE-09374C9B1FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611A649F-161B-4683-98D5-4C8150838039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D39E1ED-2F67-4116-9BF5-44CA8EF9A016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"729613AF-4C56-4514-9ECD-6A466C278E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"368F2F9E-FD52-4A74-8378-DF246252B745\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E452976-8876-40D7-8880-29197DB5457A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE5C762-5329-47E9-8D0C-C0A546AC24CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D93F335-8058-45BA-8653-9F3E4A5FA28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF152F35-32C6-4C2A-BC91-90AAE442F239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2a\\\\)ex5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD47CBD-A833-4CD0-A62C-22FBB7A4244D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72782F95-948D-489B-A19A-9DAB825DFE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0F2B2A-F273-4166-826F-88B54A480BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C846C74-7644-4DAB-A4B8-B33464EBE92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E5F96-48DB-41C4-B45E-5BE0367DD7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80114F8D-320D-41FF-ADD3-729E250A8CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879C4495-3B26-4370-8708-16F5002E37CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C2BB1F-79DF-4471-B75F-C22CEBB5380F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5A55B3-49E4-4C48-B942-4816504BAA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AADD63-CEA3-461B-94EA-0CDAB4A2ED00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB704746-C27B-4C6B-948C-B8C0A3F40782\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F354F8F6-70D3-43EE-BF08-DFB87E83E847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F908B0-7ECE-40F8-8549-29BD1A070606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378E67DD-779C-4852-BF29-38C2DFFB1BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9033ACC7-1CCC-44E7-8275-73499C0E6E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD4AF73-6C03-4978-BC43-857188BF7E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785E177-C04E-4170-9C35-B4259D14EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAE727E-E552-4222-8FF0-6146A813BDEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7850295-C728-4448-ABA7-D01397DBBE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C104A47-53EE-47FC-BAE5-21925BEE98E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD28874B-148A-4299-9AA1-67A550B25F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29B2E6F-ED6C-4568-9042-7A1BD96A9E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DEE2C71-C401-43D1-86DC-725FE5FDF87E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758F264-96F9-4EE9-9CA9-AD5407885547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2842F6-4CD5-457C-AC75-241A5AB9534B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE0470-E94A-4CAF-865D-73E2607A0DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CCD7E3-C62B-4151-96FF-1175D4896E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6437E689-A049-4D48-AB7A-49CA7EBDE8B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110B699D-169E-4932-A480-6EBB90CAE94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C12918-E5BB-465E-9DA4-06B7351DD805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4862C453-8BD7-4D53-B2D6-CE3E44A4915A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C4E1F4-AD64-418C-A308-85501E0F3EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57ED9CDC-FC03-4DA7-A791-CE61D0D8364D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB8C3BBA-4829-4006-B7EB-F552D86922C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F980EFA3-BB92-49D3-8D5F-2804BB44ABB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e3k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6D0AA7-E879-4303-AB2D-4FEF3574B60E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345C9300-CAC2-4427-A6B4-8DBC72573E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BFCF66-DE06-46DA-8F9D-60A446DC0F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BDF6ABA-F0A4-423F-9056-A57C6A074137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956FE25C-3CB8-4479-850D-719827123A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23ABB581-90EF-4F6C-9778-735932D2B08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3FD874-5EDF-48E0-A5AC-415A620C1FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F396D6-9B6E-4E6A-B561-9822DB13C7AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7a\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1374E243-4EC2-4A81-991C-B5705135CAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7b\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECA6101-94BA-4209-8243-A56AF02963EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFF00927-80B0-4BE3-BF7C-E663A5E7763A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9795E31D-A642-4100-A980-CD49C291AB7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C79479-27C6-4273-BC80-70395D609197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28ACC494-2B4B-4BCE-9275-B7B10CC69B1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602A88C0-30D1-4B63-A8F7-EF1D35350897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3AE0C5-D071-44B4-B820-422296FDC259\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5B6046-6377-471B-9639-D7F635B08190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFCF1E00-1C43-486E-A64E-14F5BEF82362\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76048CE-58D5-4F67-8679-9C863D41F15E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7DC221-0BA1-4051-8643-1180C9EA682A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00CEE576-6C55-4BD4-B9F2-33E40483437B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2683677D-9FD4-416B-8CFF-D81AF3174B3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"548B1FAF-946A-446B-8248-10BC194496B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3531645A-C4FB-4F6D-BBD2-D2852AA13509\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46984315-BF1E-4146-9960-328AEFA73D54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"927762E0-6EE5-48C9-A7EE-8824BEBED08A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F1CA06-D540-4CDB-BACB-5D528C830753\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53A6E90-DA02-420A-B4A7-BC6D73C4B95A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48837AB-F3DB-4246-90E2-6D8CD8BCF658\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B888C8-9E13-4353-A8D8-96900726AE77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA35A21E-9FB8-4694-B46D-E9381CB3D0C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5F1600-30A5-4B31-A518-7B84BFE16883\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03D0B73-B854-4385-9AD2-EAC7B041558D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868B074C-2A14-4242-829A-202095A2CFF1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C990D9F-42F4-4722-AF6E-2933E5872C17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C76EA7-969F-4A5F-B045-995C9445B415\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567757A5-74CB-4FB6-9BDA-FA4F51A02998\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7794B87E-C70E-4DA3-9FC8-0170A0898557\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BEB1267-B23F-4001-B6E2-49894CF6EC38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845DDB35-3BB6-41CB-8304-340F444B6FE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAC629E-531F-4B99-9A07-15E113169FCA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63DC2E4-83AB-487E-80D5-036723D930F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F543085-A2E2-4D7E-96EC-E9C6B964AED2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64C85B3-D227-4BE7-BE7B-B05F86FE0583\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A153EAF3-C3DC-49C5-BBBA-7459850B1F57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2000D5-E0C0-4488-8213-DC3079301050\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63AF0F69-A0E0-4AAC-B96B-1C1B59D76669\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179F9893-1C6B-468E-84F3-1CAAAE0A7671\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABDF97F-B703-40A0-B510-D73859139E87\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6637D9D4-14CE-48D2-90D4-19EF761F4193\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE430A-2446-4F29-88D8-D452D1022B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DF34EC-7BC3-44DC-B7B1-94162245CBBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06EEDB4F-BD1E-4914-AF79-64D42643683D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54BFFB02-7C84-4569-8129-74B84A5E7310\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12A3197-0CE2-44F4-B310-DE8D4A72B00D\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20181\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-07T18:56:17.739877Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-07T18:56:19.192Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCvd75918\"], \"advisory\": \"cisco-sa-c2960-3560-sboot-ZtqADrHq\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_0\", \"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 6.8, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"IOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"15.0(1)XO1\"}, {\"status\": \"affected\", \"version\": \"15.0(1)XO\"}, {\"status\": \"affected\", \"version\": \"15.0(2)XO\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EY\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EY1\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EY2\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SE8\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EX\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX1\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX2\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX3\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX4\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX5\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX8\"}, {\"status\": \"affected\", \"version\": \"15.0(2a)EX5\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX10\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX11\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX13\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX12\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(2a)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(2a)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(3a)E\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(5)E\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(5)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(5b)E\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E5a\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E5b\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E7\"}, {\"status\": \"affected\", \"version\": \"15.2(5)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E8\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E0a\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E0c\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E9\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E7\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E10\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E8\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E2a\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E2b\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E0a\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E0b\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E0s\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E9\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(7a)E0b\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E10\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E1a\"}, {\"status\": \"affected\", \"version\": \"15.2(7b)E0b\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E2a\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E10a\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E3k\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E10d\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E7\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E8\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E9\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E10\"}, {\"status\": \"affected\", \"version\": \"15.2(6)EB\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA7\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA8\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA9\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA9a\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD1\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD2\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD3\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD4\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD5\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD6\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD7\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD8\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq\", \"name\": \"cisco-sa-c2960-3560-sboot-ZtqADrHq\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\\r\\n\\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\\r\\n\\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-347\", \"description\": \"Improper Verification of Cryptographic Signature\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-05-07T17:35:31.850Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-20181\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-07T19:45:02.742Z\", \"dateReserved\": \"2024-10-10T19:15:13.225Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2025-05-07T17:35:31.850Z\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…