All the vulnerabilites related to cisco - 1120_connected_grid_router
Vulnerability from fkie_nvd
Published
2017-09-29 01:34
Modified
2024-11-21 03:09
Severity ?
Summary
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/101038 | Broken Link, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039459 | Broken Link, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101038 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039459 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip | Vendor Advisory |
Impacted products
{ "cisaActionDue": "2022-03-24", "cisaExploitAdd": "2022-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco IOS Software Common Industrial Protocol Request Denial-of-Service Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AE09220-EF68-4DFE-AA9C-E4F5508EDF3D", "versionEndIncluding": "15.6", "versionStartIncluding": "12.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100_terminal_services_gateways:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A4ED65-7DED-4EAD-BF37-FCA71E807CA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1111-4pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7262ADAB-296F-4DC2-9CD7-A86D7F6441C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1111-8pwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3056B31-1977-4472-BC74-19A5B8B5EC44", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1111x-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "784E4562-FE26-4049-9D23-4CA46432EE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1113-8plteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "9261A638-E2E4-4EF0-84E9-A585BF763263", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1113-8pmwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C85463D-0B37-4746-B7EA-80F3096305E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1113-8pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "58C04E5B-AC03-440F-9007-0D6761B41F68", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1116-4plteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A5E963-2987-4927-862A-6375624FC876", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1116-4pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3601499F-AD3B-47EA-816A-A01379CA1A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4plteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "303129EF-9107-4B39-8683-1BD917B3E68D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4pmlteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "76B2B271-555B-4439-95D8-086E516F1169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4pmwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CB321CD-9096-4F75-AD2F-4EAE1CA75D76", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "98F31C77-0303-4FD9-B968-6B430202C6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2D64BDE-0D00-4FBE-873B-F5D52AD0C5A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3F374DC-B9F7-4515-A064-01BB436CA984", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5E48D7-2266-4649-90A9-62C476AFE6DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "99581637-E184-4A02-8313-57C7C31E5479", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C58CEA6-69F8-4021-98C9-4676C70AB167", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF156D97-7C39-49CF-9938-D9681066FF05", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "871AC0F6-5C01-43A1-8436-7885439BD81F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "2147DBF8-B733-4F76-90C5-9D94F1E93625", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9222CA59-F4FD-478D-83C9-566B389140B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "86879AC0-890E-42F4-9561-6851F38FE0AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "19017B10-F630-42CD-ACD2-E817FEF0E7F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DF0025D-8DE1-437D-9A4E-72C3AC6B46CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la implementaci\u00f3n de una caracter\u00edstica CIP (Common Industrial Protocol) en Cisco IOS desde la versi\u00f3n 12.4 hasta la 15.6 podr\u00edan permitir que un atacante remoto sin autenticar haga que el dispositivo afectado se reinicie, provocando una denegaci\u00f3n de servicio (DoS) en consecuencia. Estas vulnerabilidades se deben a un an\u00e1lisis sint\u00e1ctico incorrecto de los paquetes CIP manipulados destinados al dispositivo afectado. Un atacante podr\u00eda explotar estas vulnerabilidades enviando paquetes CIP manipulados para que los procese el dispositivo afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el atacante consiga que el dispositivo afectado se reinicie, provocando una denegaci\u00f3n de servicio. Cisco Bug IDs: CSCvc43709." } ], "id": "CVE-2017-12234", "lastModified": "2024-11-21T03:09:05.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-29T01:34:48.857", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101038" }, { "source": "ykramarz@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039459" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-28 22:29
Modified
2024-11-21 03:37
Severity ?
Summary
A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. Cisco Bug IDs: CSCvg69701.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/103571 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103571 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", "matchCriteriaId": "005EAD76-34BE-4E3F-8840-23F613661FE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", "matchCriteriaId": "2595B3E3-7FD4-4EFF-98A2-89156A657A0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", "matchCriteriaId": "FB998A1F-BAEA-4B8F-BE49-1C282ED3952E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*", "matchCriteriaId": "A55379B7-2787-4BE6-8960-204C074F4CD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*", "matchCriteriaId": "8AABDAB3-6329-48CF-BB49-DA2046AB9048", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3.0i\\)m6:*:*:*:*:*:*:*", "matchCriteriaId": "3741E4BA-E70B-4571-8D80-76E16764BAA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", "matchCriteriaId": "09CD336D-1110-4B0C-B8D4-7C96293CBADE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", "matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", "matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*", "matchCriteriaId": "90950C85-D631-4F60-AB3E-3ED1D74D56B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*", "matchCriteriaId": "CD79CA0D-7D90-4955-969A-C25873B0B9D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", "matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5a:*:*:*:*:*:*:*", "matchCriteriaId": "BBF3D5CF-5352-4CEA-865C-62CBB79778FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", "matchCriteriaId": "FFD51F00-C219-439F-918E-9AF20A6E053A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", "matchCriteriaId": "57BCB671-7ED0-43D5-894F-8B3DBF44E68E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*", "matchCriteriaId": "691BA27E-77AB-4A30-916D-3BB916B05298", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", "matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", "matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*", "matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", "matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*", "matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1905_serial_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B293D3-4CF0-4FDA-B70D-371F54BF1F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "2147DBF8-B733-4F76-90C5-9D94F1E93625", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9222CA59-F4FD-478D-83C9-566B389140B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:2010_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "65652B80-3B0D-4DCA-A57F-DF473CE80561", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:2901_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F3EA062-2C68-49C8-BFE3-BB7B59EE00BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:2911_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4521999-53C8-4245-BE23-9EA9CBCDEE21", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:2911a_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7E158EB-7DFD-4EC3-B057-FCFCB7074CB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:2921_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1773D4FE-5416-4A87-BF1C-F1BDF0E8D5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:2951_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9185EDA0-2983-4E00-8985-5E76415DF427", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:3925_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "83C34A26-E6E2-4651-822D-74F642D7A8FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:3925e_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "096C701F-8203-41FB-82DC-BB5C9263A292", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:3945_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "94332BC5-DD19-4422-B4E3-21D6E2BCA367", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:3945e_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB8466AE-B885-40BA-ADB8-C1058D95129C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:5915_embedded_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "77DE5576-90BE-4C25-8677-19009A8CD647", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:5921_embedded_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "58511A4E-43BD-49A8-87B8-532CEB51BB7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:5940_embedded_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EBF9DBE-0E5E-4E57-990D-0908F036ACAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:800_series_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEE86F95-4B0D-4A21-AF52-685783919201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:800m_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9F9D3C-8221-4C79-97A3-9FEA81DE977F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF4558F1-B87C-439F-AF8F-C19AACAB80E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:812_3g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A0EEEB5-8305-4A57-9904-D81551FB6A81", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:812_cifi_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8D371C4-7034-4675-931D-E6A208FD901C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:819_hardened_3g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFAED93B-35B1-4738-A03F-4AEB158F8DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:819_hardened_dual_radio_802.11n_wifi_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAF3EFC2-EF88-47E6-B174-7561A19FB543", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:819_hardened_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "30FCD835-282D-440A-833D-771F6EC7A93D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:819_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "C054E067-52B9-4AB4-87CB-2B6A3B890FFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:819_non-hardened_4g_lte_m2m:-:*:*:*:*:*:*:*", "matchCriteriaId": "74E5C08A-3091-4A4F-956B-1AD497F30DC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:819_non-hardened_secure_multi-mode_4g_lte_m2m_isr_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "12140B3E-F3FE-436C-9B35-254F7AB7DC02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "398D63B0-F15B-409B-AFBC-DE6C94FAF815", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:860vae-w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C9C511D-7D5E-4758-A335-70019EBD9F8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "E109E908-78B9-44ED-8719-B057057C2185", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:861w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "31F8D515-3D54-459F-8CE7-FFA91439C0D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:866vae_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "510B60EF-AA4D-469F-8EEF-133F354DDF55", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:867vae_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D562373-BD3F-4690-928F-9FE0325A3379", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:880-voice_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62165B-6CA9-4DD8-8A36-B658F61FF9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:881-cube_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA5ACE25-8C18-49B0-AFFC-17CB30F61930", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:881_3g:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD08336-5BBD-4133-892B-F67A692A5DA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:881_3g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6E4CF5-D944-4281-94E5-72BC5437BC62", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:881_secure_fast_ethernet:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A32A56-86F1-44A3-81F3-EBA72B0010E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:881w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "480629DC-DA23-4A9E-B90F-E8AB894C9353", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:886va-cube_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3EA60A-1BA9-43E8-AF81-914846C26CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7C5306-B810-4036-A241-7178F48ABE8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5413C7E7-F55C-4158-ABDF-2D8844B96680", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:886vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6745ADF-DCE3-42C3-A548-F9E44AEE88CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887_multi-mode_vdsl2\\/asdl2\\+_pots:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EF0D0-B875-40C1-86D1-90CD3F7F1B2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887va-cube_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1563AC8D-4E4D-4126-8C5D-84B449AAEF57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3945CCD-E6F5-412D-9935-160BCD664B10", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0C23393-F7BB-4BA9-81A5-C298D84EBF0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B623C2-D81B-430B-9FD2-E2764EE94809", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887vagw_3g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAF439A3-3645-4574-A102-017354DE8131", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887vam-w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "828E07F6-1E92-4990-AEBC-DBFE4B5B2DE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:887vamg_3g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B77C60-06E0-47FF-8CD4-35FE5C60FF95", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:888-cube_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E97DA13-D485-42BE-A0E9-F40A0C823735", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "E984A1EA-728A-4663-8494-1787AB5D93C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:888e-cube_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "35D9B6C7-A707-41CD-953F-5773FB3F7685", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:888e_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "716E154A-5586-4F58-8203-EC8256E00BAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:888eg_3g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CC0F79A-52CA-46A6-9C6A-0596718053E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:888w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "8054E665-E4DA-4453-A34B-830B69D273A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:891-24x_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEA480B3-25E2-4B05-9F46-417B696789B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "526558F9-C72D-4DDA-B0DF-CAF7B97E30C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:891w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4B9D069-85C0-4299-BCAF-441A2D6227BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "53AFBDFF-3D83-4685-82EE-A9EA4DC09241", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:892f-cube_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB4AF464-B247-40CF-A2B5-1B278303418B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:892w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "D674C533-304A-42A4-97EE-1CA39908E888", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:896_multi-mode_vdsl2\\/adsl2\\+_isdn:-:*:*:*:*:*:*:*", "matchCriteriaId": "39CCB6E7-6AAD-4C27-942F-625A0B57A029", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:897_multi-mode_vdsl2\\/adsl2\\+_pots:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D66DE9A-4B9F-443A-9DC2-6B44432D6663", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:897_multi-mode_vdsl2\\/adsl2\\+_pots_annex_m:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A38258B-D065-4872-8E49-2169D6FEDC72", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:898_secure_g.shdsl_efm\\/atm:-:*:*:*:*:*:*:*", "matchCriteriaId": "67D848BF-BD1E-4299-AA05-218144F9B8D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c866vae_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "21302143-3B04-47A5-B434-874D4CDA0684", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c867vae_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1807A783-B5F1-4735-AE49-9E221EE75E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c881_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6FB2D3-1816-43C7-99A7-4F2D5E8860F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c881w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F508C7A1-F13A-4244-888B-5E05F750063D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c886va_integrated_services_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "A43E014D-9AD7-467B-86A1-5C0B94A2688A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c886vaj_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "83C5F298-30A3-40F5-B9E9-F34A8C19E60A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c887va_integrated_services_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA0DA50-67B7-4AC4-A9CD-5EECD34B59C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c887vam_integrated_services_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "134AA9EA-0E47-4FD0-A87F-893F6128AC43", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c888_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C4E6F8-ED20-4C43-83C0-428D8543A3D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c888ea_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "C23800E6-C99A-40A7-AED9-CE7D3B43AE5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c891f_integrated_services_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "B282F195-F5D9-466A-A6A9-D79F3495212B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c891fw_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7E1648C-3622-4F71-98E6-E6CF679AB452", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c892fsp_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFE85E76-B78E-4E87-88EA-982944D7F446", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c896va_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C7559F8-560D-4E41-A547-1AFC19C80CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c897va-m_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "8821A4E0-947C-47BF-89DD-5C48DA3EF1F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c897va_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CBBBD9-7B05-4CB1-8754-D0E790D4D30A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c897vam-w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "C746068A-4BFF-4037-9D6F-7364A4825B42", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c897vaw_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "44EDBCAB-7642-4847-BFCD-E02A87E168D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c898ea_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F256369B-8D50-49C9-B566-700F5AA5FF72", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c899_secure_gigabit_ethernet:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C7132A5-8C2E-4DD2-8789-3DA7ECA2BEBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:vg204xm_analog_voice_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "699BEF9C-4EDD-48C5-A50A-B7BCBF8D5DEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:vg350_analog_voice_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "0839661C-7E1C-4B34-A34E-EF4CC54238CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:vg3x0_analog_voice_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D57FD27-C856-4969-9746-840E90A8F873", "vulnerable": false }, { "criteria": "cpe:2.3:h:rockwellautomation:stratix_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D000E55-C5D4-421C-813B-59B6EB200000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. Cisco Bug IDs: CSCvg69701." }, { "lang": "es", "value": "Una vulnerabilidad en e la caracter\u00edstica multiple-authentication (multi-auth) 802.1x de Cisco IOS Software podr\u00eda permitir que un atacante adyacente sin autenticar omita la fase de autenticaci\u00f3n en un puerto multi-auth 802.1x. Esta vulnerabilidad se debe a un error de cambio de l\u00f3gica introducido en el c\u00f3digo. Un atacante podr\u00eda explotar esta vulnerabilidad intentando acceder a un puerto multi-auth 802.1x despu\u00e9s de que un solicitante se haya autenticado con \u00e9xito. Un exploit podr\u00eda permitir que el atacante omita los controles de acceso 802.1x y obtenga acceso a la red. Cisco Bug IDs: CSCvg69701." } ], "id": "CVE-2018-0163", "lastModified": "2024-11-21T03:37:38.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-28T22:29:00.750", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103571" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-03 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 15.8\(3.0z\)m1 | |
cisco | ios | 15.9 | |
cisco | 1120_connected_grid_router | - | |
cisco | 1240_connected_grid_router | - | |
cisco | ir809g-lte-ga-k9 | - | |
cisco | ir809g-lte-la-k9 | - | |
cisco | ir809g-lte-na-k9 | - | |
cisco | ir809g-lte-vz-k9 | - | |
cisco | ir829-2lte-ea-ak9 | - | |
cisco | ir829-2lte-ea-bk9 | - | |
cisco | ir829-2lte-ea-ek9 | - | |
cisco | ir829gw-lte-ga-ck9 | - | |
cisco | ir829gw-lte-ga-ek9 | - | |
cisco | ir829gw-lte-ga-sk9 | - | |
cisco | ir829gw-lte-ga-zk9 | - | |
cisco | ir829gw-lte-na-ak9 | - | |
cisco | ir829gw-lte-vz-ak9 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3.0z\\)m1:*:*:*:*:*:*:*", "matchCriteriaId": "02EC0719-9B7C-48FA-8354-B1433F3C5435", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.9:*:*:*:*:*:*:*", "matchCriteriaId": "AFA9B42B-5D01-40F8-9981-7E094534F3C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir809g-lte-ga-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B4B073-21C9-43EC-9F3E-6B9E14302D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir809g-lte-la-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "661C304A-BE1A-4A5A-8B35-B18725082AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir809g-lte-na-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "1189BB4A-AE5E-450E-AC4C-B5A03172799F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir809g-lte-vz-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "168FA298-68C0-4BB1-A94A-21E3615FBA6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en el entorno de aplicaci\u00f3n Cisco IOx de Cisco 809 y 829 Industrial Integrated Services Routers (Industrial ISRs) y Cisco 1000 Series Connected Grid Routers (CGR1000) que ejecuta Cisco IOS Software, podr\u00edan permitir a un atacante causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) o ejecutar c\u00f3digo arbitrario con privilegios elevados sobre un dispositivo afectado. Para mayor informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso." } ], "id": "CVE-2020-3257", "lastModified": "2024-11-21T05:30:40.277", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-03T18:15:21.840", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-24 18:15
Modified
2024-11-21 05:31
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
A vulnerability in the implementation of the Low Power, Wide Area (LPWA) subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data or cause a denial of service (DoS) condition. The vulnerability is due to a lack of input and validation checking mechanisms for virtual-LPWA (VLPWA) protocol modem messages. An attacker could exploit this vulnerability by supplying crafted packets to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data or cause the VLPWA interface of the affected device to shut down, resulting in DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:807_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EEA0369-B5B1-41FD-98EE-F7F4EAB9863D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF4558F1-B87C-439F-AF8F-C19AACAB80E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "398D63B0-F15B-409B-AFBC-DE6C94FAF815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the Low Power, Wide Area (LPWA) subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data or cause a denial of service (DoS) condition. The vulnerability is due to a lack of input and validation checking mechanisms for virtual-LPWA (VLPWA) protocol modem messages. An attacker could exploit this vulnerability by supplying crafted packets to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data or cause the VLPWA interface of the affected device to shut down, resulting in DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la implementaci\u00f3n del subsistema Low Power, Wide Area (LPWA) de Cisco IOS Software para Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) y Cisco 1000 Series Connected Grid Routers (CGR1000), podr\u00eda permitir a un atacante remoto no autenticado conseguir acceso de lectura no autorizado a datos confidenciales o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS).\u0026#xa0;La vulnerabilidad es debido a la falta de mecanismos de comprobaci\u00f3n de entrada para mensajes de m\u00f3dem de protocolo virtual-LPWA (VLPWA).\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el suministro de paquetes dise\u00f1ados hacia un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante conseguir acceso de lectura no autorizado a datos confidenciales o hacer que la interfaz VLPWA del dispositivo afectado se apague, resultando una condici\u00f3n DoS." } ], "id": "CVE-2020-3426", "lastModified": "2024-11-21T05:31:02.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-24T18:15:19.290", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-13 19:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/108350 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | Vendor Advisory | |
ykramarz@cisco.com | https://www.kb.cert.org/vuls/id/400865 | Third Party Advisory, US Government Resource | |
ykramarz@cisco.com | https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108350 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/400865 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "524E28A1-ABD9-416B-804C-EFFD7F822DE5", "versionEndExcluding": "1.1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "763B801D-CA1E-4C56-8B06-3373EA307C7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "30AC6907-3091-409F-967D-64A82A0C5A8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "92AE506A-E710-465B-B795-470FDE0E0ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32B7016C-C909-4F30-A80E-E30E9C2FB607", "versionEndExcluding": "2.6.1.134", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*", "matchCriteriaId": "52D96810-5F79-4A83-B8CA-D015790FCF72", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*", "matchCriteriaId": "16FE2945-4975-4003-AE48-7E134E167A7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*", "matchCriteriaId": "976901BF-C52C-4F81-956A-711AF8A60140", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B8DB36E-D0AC-4FFC-8FDB-C5520689013A", "versionEndExcluding": "1.0.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E924AE61-94D5-4A68-A586-CA7119487F67", "versionEndExcluding": "1.0.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DAFDDA-718B-4B69-A524-B0CEB80FE960", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8A7F11-B920-4C5B-B3CA-D29740FFE891", "versionEndExcluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBE1DDE-6C69-45EC-A666-D9596E8721DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*", "matchCriteriaId": "00BCB49E-E2D2-4374-8D48-A287FC538F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*", "matchCriteriaId": "637D7CA3-89CD-418A-BF87-0935A7805173", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CBE2B16-B9AD-4ED2-AE18-7087C478FEEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*", "matchCriteriaId": "D94B415B-08E2-4845-BD11-7EBCD08215E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*", "matchCriteriaId": "784ECC2E-F4AC-4430-9F33-9B1DBD89692F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A34FAE4-7B2A-47BF-AB0A-5FAF8E8920CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FADBF85-52F4-468C-A44C-5107484757EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*", "matchCriteriaId": "90E418C4-F91B-4E0D-B1DC-2B099D991F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4B07-04DF-4AF2-B2A9-E4430C4F3A64", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDCD640-E1BB-48F8-BEB4-85AAF7099FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*", "matchCriteriaId": "893147FC-1AD0-441C-B031-6C432ED2FFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE30FCF9-DFF6-419C-8DCA-0B695E3FADE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*", "matchCriteriaId": "239EC4DE-5E2C-44D7-9C32-BFCD854670AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2956624-92FC-43D7-A038-15071A90E0B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*", "matchCriteriaId": "988125C4-DB88-438F-8F6D-0992424081A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD9B34B9-78EC-49AE-B342-F2BAD63CD50C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D258F96-93A5-455E-9542-2C95B3D31455", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B443FC34-767F-45B4-8516-A1A8B6C8D917", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C3403A-3943-4A69-A536-3FA6DEDFF21B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7259F6BC-BA31-47E4-BFA6-647068A946CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*", "matchCriteriaId": "3F825D9C-25C6-4F76-A7EE-F61A548A0CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "360B9A25-5272-487A-AF1A-CE2FDFD6F23C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*", "matchCriteriaId": "77C59A0F-F256-42C3-A3E1-71F02614F55A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ADE8708-95D4-4D30-85ED-BE870410F3B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F99FC1A-2738-468B-BD01-4F715A1B7809", "versionEndExcluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "90242967-37AB-4124-87DE-D826A3895BE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB99D062-EE0C-4695-AA4D-2DCE3E2B15AF", "versionEndExcluding": "16.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6CCBE67-E509-43EC-9AFB-8A9B6A115126", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "39C9F8C2-9E34-4027-9112-42AEC0B84F7C", "versionEndExcluding": "16.3.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "76843179-3569-4556-9F4C-6543B8A8E1DE", "versionEndExcluding": "16.6.7", "versionStartIncluding": "16.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B526102-9DDC-4E23-B582-DEF7EA35E42C", "versionEndExcluding": "16.9.4", "versionStartIncluding": "16.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "F50DDAE4-2C87-4B8B-9BCB-2FD32A6976D6", "versionEndExcluding": "16.12.1", "versionStartIncluding": "16.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C56A1D02-3061-40C5-AD87-0BEA869838F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F98C767-8E9F-4B01-A09E-359A496B2B3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FCAA286-6B36-4EB7-9AE5-CA082D125E78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6B1C2CF-0EF1-428F-8FB8-D45E4C6CB340", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "450EA21E-68E0-4617-85A9-9C39B96E12ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "17B65497-2EAC-4B9E-9D05-58A0B6D1F399", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "35726753-BAA4-479F-AF9C-F4D012881F83", "versionEndExcluding": "15.6\\(3\\)m7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A3FBAE1-F786-4799-AF70-6E7B5DC19BB9", "versionEndIncluding": "15.7\\(3\\)m5", "versionStartIncluding": "15.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "72240B45-0D8E-4EA6-8208-068BF6EF8B30", "versionEndExcluding": "15.8\\(3\\)m3", "versionStartIncluding": "15.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7F56D01-F647-452D-A564-4198A893BC70", "versionEndExcluding": "15.9\\(3\\)m", "versionStartIncluding": "15.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83AA5C75-B959-4167-906C-BE9C84C7E676", "versionEndExcluding": "1.0.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FBBA8E7-14B2-4869-8ED4-72F120E547FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB084F19-E475-41FA-A72F-23D4D6913523", "versionEndExcluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C49E8AE0-745B-459C-AAD9-D41690D48DDE", "versionEndExcluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5D8FF8-60F8-4F89-A488-F815D0FB00E1", "versionEndExcluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BEF89-6D9B-4870-BE85-9090152F3E6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "13C3D17D-DD95-49CA-918A-A0F5289B0C3D", "versionEndExcluding": "15.6\\(3\\)m6b", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA254534-247F-47BA-B146-0E3B7E9F9269", "versionEndIncluding": "15.7\\(3\\)m4b", "versionStartIncluding": "15.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F05F3A-A38F-4922-AE54-BE1BC64C4B7C", "versionEndExcluding": "15.8\\(3\\)m2a", "versionStartIncluding": "15.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C996F3B-0333-4B9A-B3E7-F50E64B0AAB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D05CC9-8D04-4DE0-A854-375192B4D46C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64C3BBBB-4349-4D2B-9944-84BE03407650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "76B7C13F-46C5-460A-A6C9-3837A28A0CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB060D83-2924-4D1D-9FEE-F8087FA8976D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CF4D0E5-FF09-4919-B603-B42DB535386C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*", "matchCriteriaId": "22C36989-4353-4B81-8B0F-FC6322C1C179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A267A86B-144D-46C3-9F63-95606106A5B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "C807F789-3038-42C3-B5EB-6CD628EBF718", "versionEndExcluding": "16.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "DED2353D-A508-4764-975F-57F9DACD91FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EBA765C-B6F0-4D4D-8933-06E655084AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC6F34E1-7DE4-459B-AF41-D973201ADC49", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8DAC3AF-FEFC-4B14-A7BE-7008E65FD012", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B83BED-5A49-4CF0-9827-AA291D01F60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C1E8937-51D9-43E6-876E-5D39AD3D32C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA7AE63-99B9-4F28-8670-639A9B31E494", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E858B4AB-49B1-4F1C-8722-6E6911194924", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*", "matchCriteriaId": "577D1BF2-5180-4301-941C-3C0ADDD23AA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE70CCD-6062-45D8-8566-7C9E237E030F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA3A897-ED4E-417F-BA6C-C1A825A210F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*", "matchCriteriaId": "375F9E12-A61B-4FD3-AE07-D4E686EB112A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D724F932-4548-429D-8CAA-E82C3435A194", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16088337-C057-4271-B5C7-74FE1573B0F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A69B8AFD-17F5-4809-BDB9-3337BA52BC58", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A628A7B-FE58-4881-B705-C3BCBED6F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A9C769E-ED9C-4F06-928D-CC7FFBA54EC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B19A31-99E3-4141-9FE8-7A5FD16FAE5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB1DFCD7-F14A-4530-8E36-55FE0EE1E7C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*", "matchCriteriaId": "84C89BB9-D62D-4E36-8BFD-D583F383120D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*", "matchCriteriaId": "88262B7E-8C2F-49FE-9F58-8A1C78285A93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6109DBC-5489-4FF9-B940-E174126488AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA59279-3504-417D-9E86-E5886EE198BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44B33A5-DB73-4A3B-AA5B-97B8493AD28B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB82552-DD9D-45C9-8296-B4C8D510FFA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82AF763B-9299-4EDC-B42D-B83736839CA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EA89F6-14B5-4EC7-BAEB-E783FF1982AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5BF29D2-7C65-4724-B6AE-249BB22725CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "D55DC09B-CF82-4461-8886-BE90451BFF9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "F393681D-7EC1-46D5-BAFB-786528E259B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE8CE5B-09CF-4138-9495-7223FFA64443", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "15AEC57E-7851-4C8D-AB02-A932C3929F26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "B14DB778-9B07-4AFF-8BF3-4631B23501BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "326F9936-57E7-4E8F-9C51-093788454A3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D54F012-3136-4CA8-B119-FD7446EC96C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "0514874D-C8F0-496E-9B04-FA699B339EEE", "versionEndExcluding": "15.5\\(1\\)sy4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F508C81E-D31B-44BA-82C8-FEDA00324B8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "05A9E0CA-BB70-4F74-BAD6-BE80669D1699", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAE1989-0E75-414E-BCB3-E0057F1492E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1A1BA05-615E-4304-992D-6EEA176D852F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "D883A807-6909-4087-892B-1E505521EA7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE2D76C8-552A-44C2-9C30-0CF31F6BC719", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*", "matchCriteriaId": "649A1287-A03D-48B8-ADFA-26F175366C91", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*", "matchCriteriaId": "8776111D-894D-4EEB-8ADD-A9AC26AE30D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*", "matchCriteriaId": "975D2EC3-3499-48FD-87F2-4BAD1CDB0E4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "27ACCA11-D39B-468E-9C3C-BBF110ED3581", "versionEndExcluding": "16.9.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB36C23-9303-4E3D-8C4A-B2E2150CF3FE", "versionEndExcluding": "16.12.1", "versionStartIncluding": "16.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F5F6FA-9499-4232-A80A-494CE287A87A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*", "matchCriteriaId": "58918BAA-7070-4901-B1C8-344E8A4DBEE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C809A939-105E-471E-A150-859015641989", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C657B7-172E-4E85-8027-4B5563F2CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B42926F-0841-4D40-BABE-852893C6020F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*", "matchCriteriaId": "381144D6-7CDE-46E6-ADE7-76372740F283", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "902D1451-9E2E-4BC3-8B61-D87C142F4485", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E283C34-43AE-49A5-A72B-32DEA185ABD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59CD23DF-9B9D-459F-A3BF-F2D53FBDAF71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB3AF13-5324-42CD-8EDB-6F730BF46214", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13174CD9-8564-4041-93EC-8E8D7F4F3443", "versionEndExcluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B443B2C3-E3C1-4ADF-BF9B-164D00318B08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053", "versionEndExcluding": "8.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE54217-EF6D-4191-9267-113041B14A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DE58C19-66CD-45DD-BF5C-C333A30AA096", "versionEndExcluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF3999-1FF6-42C0-BE62-3FA227297264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "966F7DF8-1F20-4A74-B633-8B5AEE63C193", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "46EA0E17-C399-4DA0-A550-F5469CC82F3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C4BF85-7077-463B-8E52-F67949849123", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9102353-A21A-41C2-AA0B-9B00F66B693E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1536A363-E423-42DD-928B-FC6E91264371", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB4F5CA4-BBD2-4DC9-8F99-9CC1B2A90BF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2442B13-F163-4219-AED9-7FA4CCD1A8D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*", "matchCriteriaId": "7617BA24-6474-49CF-B78D-0056D3F8385B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*", "matchCriteriaId": "344675F6-9045-492D-9577-E0CE333AD6E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7F2221-B5BE-408C-BA84-9776469EE2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D61548-61B4-4B53-8574-9DB92B00A627", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FF08FAF-67DD-4361-947A-40D5938DB8BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CE2AD36-5D52-4489-AAC1-A7AC1B3D2581", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FEA95-703B-44E0-A7CA-9E38B2EB1980", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D37BF94-9D5F-4A88-8115-3A88FF144845", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F0D81-1314-440B-9FC2-56D76CA4CD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E50806D-115D-4903-A5B2-62654FFDD9F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15AE071E-0CEF-4305-A92D-9F4C324BD4ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E007368-04AF-49C7-892F-ED2BB1E4EA61", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DBEF775-EC98-4391-BAD2-61870A7DEE88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "68A586A3-0291-4BA3-9211-6EE0BBB7F39C", "versionEndExcluding": "9.3\\(2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AEB8547-3FA8-42F5-8106-57B0F994BEC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D2069C-23A2-4113-B674-024D36E40BDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "572F9105-9B6C-4460-8B49-14812AC3DC28", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE8EFEE8-FC8D-480C-917E-24C3B8D56E29", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6487A95B-0D04-4ABA-B491-8A935694AFD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2E84307-41BC-4F85-BC9A-FF02178765F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "55A31452-5B60-4273-BA38-8FA684DED953", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3FCA39-927B-4C89-A58B-E6859ED8176A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7B464B3-DE25-4980-ABC3-10D7C79C12E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "214472EB-424C-48B7-8EF3-7B679A5042BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053", "versionEndExcluding": "8.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E3CF0C-5AD0-4A30-9335-4945CBC04A60", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E6AC35C-29B2-42C7-862D-D9AC3461D8D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33AB95C-62FC-48EC-84AB-5EFA5C061F3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D409BDF3-9F35-4D94-9DF0-7B58A519A005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B12A01-8EF8-4DDE-9A40-51A9BC7D42AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*", "matchCriteriaId": "696AFE49-10E1-4C56-93D3-F4118B3E01AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6741CC-EEA4-4DC8-A21B-DB84B861316B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "678F3A32-372A-441E-8115-95181FBAF628", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF426F3E-4474-43C7-84F5-EF61957E5004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AE8153-6C23-46AB-BEAA-A6F27FDFEED7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform." }, { "lang": "es", "value": "Una vulnerabilidad en la l\u00f3gica que maneja el control de acceso de uno de los componentes de hardware en la implementaci\u00f3n Secure Boot de propiedad de Cisco, podr\u00eda permitir que un atacante local autenticado escriba una imagen de firmware modificada en el componente. Esta vulnerabilidad afecta a varios productos de Cisco que admiten la funcionalidad de Secure Boot basada en hardware. La vulnerabilidad se genera por una comprobaci\u00f3n incorrecta en el \u00e1rea de c\u00f3digo que administra las actualizaciones en las instalaciones de Field Programmable Gate Array (FPGA) parte de la implementaci\u00f3n del hardware Secure Boot. Un atacante con privilegios elevados y acceso al sistema operativo subyacente que se ejecuta en el dispositivo afectado podr\u00eda explotar esta vulnerabilidad al escribir una imagen de firmware modificada en el FPGA. Una explotaci\u00f3n exitosa podr\u00eda hacer que el dispositivo se vuelva inutilizable (y requiera un reemplazo de hardware) o permitir la manipulaci\u00f3n del proceso de comprobaci\u00f3n de Secure Boot, que en algunas circunstancias puede permitir al atacante instalar y arrancar una imagen de software malicioso. Un atacante deber\u00e1 cumplir todas las condiciones siguientes para intentar explotar esta vulnerabilidad: Tener acceso administrativo privilegiado al dispositivo. Poder acceder al sistema operativo subyacente que se ejecuta en el dispositivo; Esto se puede lograr mediante el uso de un mecanismo documentado de soporte o mediante la explotaci\u00f3n de otra vulnerabilidad que proporcionar\u00eda a un atacante con dicho acceso. Desarrollar o tener acceso a un exploit espec\u00edfico de la plataforma. Un atacante que busque explotar esta vulnerabilidad en m\u00faltiples plataformas afectadas necesitar\u00e1 investigar cada una de esas plataformas y despu\u00e9s desarrollar una vulnerabilidad espec\u00edfica de la plataforma. Si bien el proceso de investigaci\u00f3n se podr\u00eda realizar en diferentes plataformas, es poco probable que una vulnerabilidad desarrollada para una plataforma de hardware determinada opere en una plataforma de hardware diferente." } ], "id": "CVE-2019-1649", "lastModified": "2024-11-21T04:37:00.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-13T19:29:01.520", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108350" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/400865" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/400865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-667" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-29 01:34
Modified
2024-11-21 03:09
Severity ?
Summary
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/101038 | Broken Link, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039459 | Broken Link, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101038 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039459 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip | Vendor Advisory |
Impacted products
{ "cisaActionDue": "2022-03-24", "cisaExploitAdd": "2022-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco IOS Software Common Industrial Protocol Request Denial-of-Service Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AE09220-EF68-4DFE-AA9C-E4F5508EDF3D", "versionEndIncluding": "15.6", "versionStartIncluding": "12.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1100_terminal_services_gateways:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A4ED65-7DED-4EAD-BF37-FCA71E807CA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1111-4pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7262ADAB-296F-4DC2-9CD7-A86D7F6441C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1111-8pwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3056B31-1977-4472-BC74-19A5B8B5EC44", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1111x-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "784E4562-FE26-4049-9D23-4CA46432EE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1113-8plteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "9261A638-E2E4-4EF0-84E9-A585BF763263", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1113-8pmwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C85463D-0B37-4746-B7EA-80F3096305E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1113-8pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "58C04E5B-AC03-440F-9007-0D6761B41F68", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1116-4plteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A5E963-2987-4927-862A-6375624FC876", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1116-4pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3601499F-AD3B-47EA-816A-A01379CA1A33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4plteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "303129EF-9107-4B39-8683-1BD917B3E68D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4pmlteeawe:-:*:*:*:*:*:*:*", "matchCriteriaId": "76B2B271-555B-4439-95D8-086E516F1169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4pmwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CB321CD-9096-4F75-AD2F-4EAE1CA75D76", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1117-4pwe:-:*:*:*:*:*:*:*", "matchCriteriaId": "98F31C77-0303-4FD9-B968-6B430202C6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2D64BDE-0D00-4FBE-873B-F5D52AD0C5A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3F374DC-B9F7-4515-A064-01BB436CA984", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5E48D7-2266-4649-90A9-62C476AFE6DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "99581637-E184-4A02-8313-57C7C31E5479", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C58CEA6-69F8-4021-98C9-4676C70AB167", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF156D97-7C39-49CF-9938-D9681066FF05", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "871AC0F6-5C01-43A1-8436-7885439BD81F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "2147DBF8-B733-4F76-90C5-9D94F1E93625", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9222CA59-F4FD-478D-83C9-566B389140B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "86879AC0-890E-42F4-9561-6851F38FE0AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "19017B10-F630-42CD-ACD2-E817FEF0E7F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DF0025D-8DE1-437D-9A4E-72C3AC6B46CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la implementaci\u00f3n de una caracter\u00edstica CIP (Common Industrial Protocol) en Cisco IOS desde la versi\u00f3n 12.4 hasta la 15.6 podr\u00edan permitir que un atacante remoto sin autenticar haga que el dispositivo afectado se reinicie, provocando una denegaci\u00f3n de servicio (DoS) en consecuencia. Estas vulnerabilidades se deben a un an\u00e1lisis sint\u00e1ctico incorrecto de los paquetes CIP manipulados destinados al dispositivo afectado. Un atacante podr\u00eda explotar estas vulnerabilidades enviando paquetes CIP manipulados para que los procese el dispositivo afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el atacante consiga que el dispositivo afectado se reinicie, provocando una denegaci\u00f3n de servicio. Cisco Bug IDs: CSCuz95334." } ], "id": "CVE-2017-12233", "lastModified": "2024-11-21T03:09:05.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-29T01:34:48.827", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101038" }, { "source": "ykramarz@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039459" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2018-0163
Vulnerability from cvelistv5
Published
2018-03-28 22:00
Modified
2024-12-02 20:54
Severity ?
EPSS score ?
Summary
A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. Cisco Bug IDs: CSCvg69701.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103571 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103571", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103571" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0163", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T18:54:20.403835Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T20:54:54.828Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS" } ] } ], "datePublic": "2018-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. Cisco Bug IDs: CSCvg69701." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-03T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "103571", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103571" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS", "version": { "version_data": [ { "version_value": "Cisco IOS" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. Cisco Bug IDs: CSCvg69701." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "103571", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103571" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0163", "datePublished": "2018-03-28T22:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-12-02T20:54:54.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3257
Vulnerability from cvelistv5
Published
2020-06-03 17:56
Modified
2024-11-15 17:11
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IOS 12.2(60)EZ16 |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200603 Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3257", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:27:52.076991Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:11:12.408Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS 12.2(60)EZ16", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-03T17:56:08", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200603 Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL" } ], "source": { "advisory": "cisco-sa-ios-iot-gos-vuln-s9qS8kYL", "defect": [ [ "CSCvq68872", "CSCvr15042" ] ], "discovery": "INTERNAL" }, "title": "Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-03T16:00:00", "ID": "CVE-2020-3257", "STATE": "PUBLIC", "TITLE": "Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS 12.2(60)EZ16", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200603 Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL" } ] }, "source": { "advisory": "cisco-sa-ios-iot-gos-vuln-s9qS8kYL", "defect": [ [ "CSCvq68872", "CSCvr15042" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3257", "datePublished": "2020-06-03T17:56:08.634778Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:11:12.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12233
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-11-15 17:57
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101038 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1039459 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "name": "101038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101038" }, { "name": "1039459", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039459" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-12233", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:33:57.232876Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12233" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:57:38.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS" } ] } ], "datePublic": "2017-09-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-29T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "name": "101038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101038" }, { "name": "1039459", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039459" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS", "version": { "version_data": [ { "version_value": "Cisco IOS" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "name": "101038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101038" }, { "name": "1039459", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039459" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12233", "datePublished": "2017-09-28T07:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-11-15T17:57:38.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3426
Vulnerability from cvelistv5
Published
2020-09-24 18:01
Modified
2024-11-13 17:56
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of the Low Power, Wide Area (LPWA) subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data or cause a denial of service (DoS) condition. The vulnerability is due to a lack of input and validation checking mechanisms for virtual-LPWA (VLPWA) protocol modem messages. An attacker could exploit this vulnerability by supplying crafted packets to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data or cause the VLPWA interface of the affected device to shut down, resulting in DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IOS 15.2(6)E4 |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200924 Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3426", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:12:43.554572Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:56:53.388Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS 15.2(6)E4", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the Low Power, Wide Area (LPWA) subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data or cause a denial of service (DoS) condition. The vulnerability is due to a lack of input and validation checking mechanisms for virtual-LPWA (VLPWA) protocol modem messages. An attacker could exploit this vulnerability by supplying crafted packets to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data or cause the VLPWA interface of the affected device to shut down, resulting in DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-24T18:01:14", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200924 Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA" } ], "source": { "advisory": "cisco-sa-ios-lpwa-access-cXsD7PRA", "defect": [ [ "CSCvr53526" ] ], "discovery": "INTERNAL" }, "title": "Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-09-24T16:00:00", "ID": "CVE-2020-3426", "STATE": "PUBLIC", "TITLE": "Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS 15.2(6)E4", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the implementation of the Low Power, Wide Area (LPWA) subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data or cause a denial of service (DoS) condition. The vulnerability is due to a lack of input and validation checking mechanisms for virtual-LPWA (VLPWA) protocol modem messages. An attacker could exploit this vulnerability by supplying crafted packets to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data or cause the VLPWA interface of the affected device to shut down, resulting in DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "20200924 Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA" } ] }, "source": { "advisory": "cisco-sa-ios-lpwa-access-cXsD7PRA", "defect": [ [ "CSCvr53526" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3426", "datePublished": "2020-09-24T18:01:14.219272Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:56:53.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1649
Vulnerability from cvelistv5
Published
2019-05-13 19:10
Modified
2024-11-20 17:23
Severity ?
EPSS score ?
Summary
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | vendor-advisory, x_refsource_CISCO | |
https://www.kb.cert.org/vuls/id/400865 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/108350 | vdb-entry, x_refsource_BID | |
https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Routers |
Version: unspecified < 16.12.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot" }, { "name": "VU#400865", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/400865" }, { "name": "108350", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108350" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1649", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:08.575056Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:23:01.830Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Routers", "vendor": "Cisco", "versions": [ { "lessThan": "16.12.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform." } ], "exploits": [ { "lang": "en", "value": "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-26T02:22:29", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot" }, { "name": "VU#400865", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/400865" }, { "name": "108350", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108350" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03" } ], "source": { "advisory": "cisco-sa-20190513-secureboot", "defect": [ [ "CSCvn77141", "CSCvn77142", "CSCvn77143", "CSCvn77147", "CSCvn77150", "CSCvn77151", "CSCvn77152", "CSCvn77153", "CSCvn77154", "CSCvn77155", "CSCvn77156", "CSCvn77158", "CSCvn77159", "CSCvn77160", "CSCvn77162", "CSCvn77166", "CSCvn77167", "CSCvn77168", "CSCvn77169", "CSCvn77170", "CSCvn77171", "CSCvn77172", "CSCvn77175", "CSCvn77178", "CSCvn77180", "CSCvn77181", "CSCvn77182", "CSCvn77183", "CSCvn77184", "CSCvn77185", "CSCvn77191", "CSCvn77201", "CSCvn77202", "CSCvn77205", "CSCvn77207", "CSCvn77209", "CSCvn77212", "CSCvn77219", "CSCvn77220", "CSCvn77222", "CSCvn77245", "CSCvn77246", "CSCvn77248", "CSCvn77249", "CSCvn89137", "CSCvn89138", "CSCvn89140", "CSCvn89143", "CSCvn89144", "CSCvn89145", "CSCvn89146", "CSCvn89150", "CSCvp42792" ] ], "discovery": "INTERNAL" }, "title": "Cisco Secure Boot Hardware Tampering Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-13T17:30:00-0700", "ID": "CVE-2019-1649", "STATE": "PUBLIC", "TITLE": "Cisco Secure Boot Hardware Tampering Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Routers", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "16.12.1" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform." } ] }, "exploit": [ { "lang": "en", "value": "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019." } ], "impact": { "cvss": { "baseScore": "6.7", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot" }, { "name": "VU#400865", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/400865" }, { "name": "108350", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108350" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03" } ] }, "source": { "advisory": "cisco-sa-20190513-secureboot", "defect": [ [ "CSCvn77141", "CSCvn77142", "CSCvn77143", "CSCvn77147", "CSCvn77150", "CSCvn77151", "CSCvn77152", "CSCvn77153", "CSCvn77154", "CSCvn77155", "CSCvn77156", "CSCvn77158", "CSCvn77159", "CSCvn77160", "CSCvn77162", "CSCvn77166", "CSCvn77167", "CSCvn77168", "CSCvn77169", "CSCvn77170", "CSCvn77171", "CSCvn77172", "CSCvn77175", "CSCvn77178", "CSCvn77180", "CSCvn77181", "CSCvn77182", "CSCvn77183", "CSCvn77184", "CSCvn77185", "CSCvn77191", "CSCvn77201", "CSCvn77202", "CSCvn77205", "CSCvn77207", "CSCvn77209", "CSCvn77212", "CSCvn77219", "CSCvn77220", "CSCvn77222", "CSCvn77245", "CSCvn77246", "CSCvn77248", "CSCvn77249", "CSCvn89137", "CSCvn89138", "CSCvn89140", "CSCvn89143", "CSCvn89144", "CSCvn89145", "CSCvn89146", "CSCvn89150", "CSCvp42792" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1649", "datePublished": "2019-05-13T19:10:14.147871Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:23:01.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12234
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-11-15 17:57
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101038 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1039459 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "name": "101038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101038" }, { "name": "1039459", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039459" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-12234", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:33:33.008147Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12234" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:57:27.695Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS" } ] } ], "datePublic": "2017-09-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-29T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "name": "101038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101038" }, { "name": "1039459", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039459" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS", "version": { "version_data": [ { "version_value": "Cisco IOS" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip" }, { "name": "101038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101038" }, { "name": "1039459", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039459" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12234", "datePublished": "2017-09-28T07:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-11-15T17:57:27.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }