All the vulnerabilites related to cisco - aironet_ap1100
cve-2012-1350
Vulnerability from cvelistv5
Published
2012-08-06 18:00
Modified
2024-09-17 00:35
Severity ?
EPSS score ?
Summary
Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:53:37.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-06T18:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-1350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-1350", "datePublished": "2012-08-06T18:00:00Z", "dateReserved": "2012-02-27T00:00:00Z", "dateUpdated": "2024-09-17T00:35:31.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2976
Vulnerability from cvelistv5
Published
2009-08-27 17:00
Modified
2024-09-16 18:49
Severity ?
EPSS score ?
Summary
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
References
▼ | URL | Tags |
---|---|---|
http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf | x_refsource_MISC | |
http://securitytracker.com/id?1022774 | vdb-entry, x_refsource_SECTRACK | |
http://www.airmagnet.com/news/press_releases/2009/08252009.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:37.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "1022774", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022774" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-08-27T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "1022774", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022774" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2976", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf", "refsource": "MISC", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "1022774", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022774" }, { "name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php", "refsource": "MISC", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2976", "datePublished": "2009-08-27T17:00:00Z", "dateReserved": "2009-08-27T00:00:00Z", "dateUpdated": "2024-09-16T18:49:52.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2861
Vulnerability from cvelistv5
Published
2009-08-27 16:31
Modified
2024-09-17 03:18
Severity ?
EPSS score ?
Summary
The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664.
References
▼ | URL | Tags |
---|---|---|
http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf | x_refsource_MISC | |
http://www.securityfocus.com/bid/36145 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2009/2419 | vdb-entry, x_refsource_VUPEN | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=18919 | x_refsource_CONFIRM | |
http://securitytracker.com/id?1022774 | vdb-entry, x_refsource_SECTRACK | |
http://www.airmagnet.com/news/press_releases/2009/08252009.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:37.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "36145", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36145" }, { "name": "ADV-2009-2419", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2419" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919" }, { "name": "1022774", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022774" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-08-27T16:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "36145", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36145" }, { "name": "ADV-2009-2419", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2419" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919" }, { "name": "1022774", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022774" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-2861", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf", "refsource": "MISC", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "36145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36145" }, { "name": "ADV-2009-2419", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2419" }, { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919" }, { "name": "1022774", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022774" }, { "name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php", "refsource": "MISC", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-2861", "datePublished": "2009-08-27T16:31:00Z", "dateReserved": "2009-08-19T00:00:00Z", "dateUpdated": "2024-09-17T03:18:20.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7998
Vulnerability from cvelistv5
Published
2014-11-15 02:00
Modified
2024-08-06 13:10
Severity ?
EPSS score ?
Summary
Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/98692 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id/1031219 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:49.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ciscoios-eap-cve20147998-dos(98692)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692" }, { "name": "1031219", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031219" }, { "name": "20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS on Aironet access points, when \"dot11 aaa authenticator\" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "ciscoios-eap-cve20147998-dos(98692)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692" }, { "name": "1031219", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031219" }, { "name": "20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-7998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS on Aironet access points, when \"dot11 aaa authenticator\" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ciscoios-eap-cve20147998-dos(98692)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692" }, { "name": "1031219", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031219" }, { "name": "20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-7998", "datePublished": "2014-11-15T02:00:00", "dateReserved": "2014-10-08T00:00:00", "dateUpdated": "2024-08-06T13:10:49.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7997
Vulnerability from cvelistv5
Published
2014-11-15 02:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/98691 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id/1031218 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-aironet-cve20147997-dos(98691)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691" }, { "name": "1031218", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031218" }, { "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-aironet-cve20147997-dos(98691)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691" }, { "name": "1031218", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031218" }, { "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-7997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-aironet-cve20147997-dos(98691)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691" }, { "name": "1031218", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031218" }, { "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-7997", "datePublished": "2014-11-15T02:00:00", "dateReserved": "2014-10-08T00:00:00", "dateUpdated": "2024-08-06T13:03:27.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0354
Vulnerability from cvelistv5
Published
2006-01-22 20:00
Modified
2024-08-07 16:34
Severity ?
EPSS score ?
Summary
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/339 | third-party-advisory, x_refsource_SREASON | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680 | vdb-entry, signature, x_refsource_OVAL | |
http://www.osvdb.org/22375 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2006/0176 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/18430 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24086 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/16217 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015483 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:14.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "339", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/339" }, { "name": "oval:org.mitre.oval:def:5680", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680" }, { "name": "22375", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22375" }, { "name": "ADV-2006-0176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0176" }, { "name": "18430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18430" }, { "name": "20060112 Access Point Memory Exhaustion from ARP Attacks", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "name": "cisco-aironet-arp-dos(24086)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086" }, { "name": "16217", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16217" }, { "name": "1015483", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015483" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "339", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/339" }, { "name": "oval:org.mitre.oval:def:5680", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680" }, { "name": "22375", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22375" }, { "name": "ADV-2006-0176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0176" }, { "name": "18430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18430" }, { "name": "20060112 Access Point Memory Exhaustion from ARP Attacks", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "name": "cisco-aironet-arp-dos(24086)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086" }, { "name": "16217", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16217" }, { "name": "1015483", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015483" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0354", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "339", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/339" }, { "name": "oval:org.mitre.oval:def:5680", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680" }, { "name": "22375", "refsource": "OSVDB", "url": "http://www.osvdb.org/22375" }, { "name": "ADV-2006-0176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0176" }, { "name": "18430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18430" }, { "name": "20060112 Access Point Memory Exhaustion from ARP Attacks", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "name": "cisco-aironet-arp-dos(24086)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086" }, { "name": "16217", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16217" }, { "name": "1015483", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015483" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0354", "datePublished": "2006-01-22T20:00:00", "dateReserved": "2006-01-22T00:00:00", "dateUpdated": "2024-08-07T16:34:14.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2006-01-22 20:03
Modified
2024-11-21 00:06
Severity ?
Summary
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | aironet_ap1100 | * | |
cisco | aironet_ap1130ag | * | |
cisco | aironet_ap1200 | * | |
cisco | aironet_ap1230ag | * | |
cisco | aironet_ap1240ag | * | |
cisco | aironet_ap1300 | * | |
cisco | aironet_ap1400 | * | |
cisco | aironet_ap350 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*", "matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*", "matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644." } ], "id": "CVE-2006-0354", "lastModified": "2024-11-21T00:06:16.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-22T20:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18430" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/339" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015483" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22375" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16217" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0176" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-06 18:55
Modified
2024-11-21 01:36
Severity ?
Summary
Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.3 | |
cisco | ios | 12.3\(1a\) | |
cisco | ios | 12.3\(2\)ja | |
cisco | ios | 12.3\(2\)ja5 | |
cisco | ios | 12.3\(2\)jk | |
cisco | ios | 12.3\(2\)jk1 | |
cisco | ios | 12.3\(2\)t3 | |
cisco | ios | 12.3\(2\)t8 | |
cisco | ios | 12.3\(2\)xa4 | |
cisco | ios | 12.3\(2\)xa5 | |
cisco | ios | 12.3\(2\)xc1 | |
cisco | ios | 12.3\(2\)xc2 | |
cisco | ios | 12.3\(2\)xc3 | |
cisco | ios | 12.3\(2\)xc4 | |
cisco | ios | 12.3\(2\)xe3 | |
cisco | ios | 12.3\(2\)xe4 | |
cisco | ios | 12.3\(3e\) | |
cisco | ios | 12.3\(3h\) | |
cisco | ios | 12.3\(3i\) | |
cisco | ios | 12.3\(4\)eo1 | |
cisco | ios | 12.3\(4\)ja | |
cisco | ios | 12.3\(4\)ja1 | |
cisco | ios | 12.3\(4\)t | |
cisco | ios | 12.3\(4\)t1 | |
cisco | ios | 12.3\(4\)t2 | |
cisco | ios | 12.3\(4\)t3 | |
cisco | ios | 12.3\(4\)t4 | |
cisco | ios | 12.3\(4\)t8 | |
cisco | ios | 12.3\(4\)tpc11a | |
cisco | ios | 12.3\(4\)xd | |
cisco | ios | 12.3\(4\)xd1 | |
cisco | ios | 12.3\(4\)xd2 | |
cisco | ios | 12.3\(4\)xe4 | |
cisco | ios | 12.3\(4\)xg1 | |
cisco | ios | 12.3\(4\)xg2 | |
cisco | ios | 12.3\(4\)xg4 | |
cisco | ios | 12.3\(4\)xg5 | |
cisco | ios | 12.3\(4\)xh | |
cisco | ios | 12.3\(4\)xk | |
cisco | ios | 12.3\(4\)xk1 | |
cisco | ios | 12.3\(4\)xk3 | |
cisco | ios | 12.3\(4\)xk4 | |
cisco | ios | 12.3\(4\)xq | |
cisco | ios | 12.3\(4\)xq1 | |
cisco | ios | 12.3\(5\) | |
cisco | ios | 12.3\(5\)b1 | |
cisco | ios | 12.3\(5a\) | |
cisco | ios | 12.3\(5a\)b | |
cisco | ios | 12.3\(5a\)b2 | |
cisco | ios | 12.3\(5a\)b5 | |
cisco | ios | 12.3\(5b\) | |
cisco | ios | 12.3\(5c\) | |
cisco | ios | 12.3\(5e\) | |
cisco | ios | 12.3\(5f\) | |
cisco | ios | 12.3\(6\) | |
cisco | ios | 12.3\(6a\) | |
cisco | ios | 12.3\(6d\) | |
cisco | ios | 12.3\(6e\) | |
cisco | ios | 12.3\(6f\) | |
cisco | ios | 12.3\(7\)ja | |
cisco | ios | 12.3\(7\)ja1 | |
cisco | ios | 12.3\(7\)jx | |
cisco | ios | 12.3\(7\)t | |
cisco | ios | 12.3\(7\)t4 | |
cisco | ios | 12.3\(7\)t8 | |
cisco | ios | 12.3\(7\)t9 | |
cisco | ios | 12.3\(7\)t10 | |
cisco | ios | 12.3\(7\)t12 | |
cisco | ios | 12.3\(7\)xi3 | |
cisco | ios | 12.3\(7\)xi4 | |
cisco | ios | 12.3\(7\)xi7 | |
cisco | ios | 12.3\(7\)xr3 | |
cisco | ios | 12.3\(7\)xr4 | |
cisco | ios | 12.3\(7\)xr6 | |
cisco | ios | 12.3\(7.7\) | |
cisco | ios | 12.3\(8\)ja | |
cisco | ios | 12.3\(8\)ja1 | |
cisco | ios | 12.3\(8\)t4 | |
cisco | ios | 12.3\(8\)t7 | |
cisco | ios | 12.3\(8\)t8 | |
cisco | ios | 12.3\(8\)t9 | |
cisco | ios | 12.3\(8\)t11 | |
cisco | ios | 12.3\(8\)xu2 | |
cisco | ios | 12.3\(8\)xy4 | |
cisco | ios | 12.3\(8\)xy5 | |
cisco | ios | 12.3\(8\)xy6 | |
cisco | ios | 12.3\(8\)ya1 | |
cisco | ios | 12.3\(8\)yd | |
cisco | ios | 12.3\(8\)yf | |
cisco | ios | 12.3\(8\)yg | |
cisco | ios | 12.3\(8\)yg1 | |
cisco | ios | 12.3\(8\)yg2 | |
cisco | ios | 12.3\(8\)yg3 | |
cisco | ios | 12.3\(8\)yh | |
cisco | ios | 12.3\(8\)yi | |
cisco | ios | 12.3\(8\)yi1 | |
cisco | ios | 12.3\(8\)yi3 | |
cisco | ios | 12.3\(9\) | |
cisco | ios | 12.3\(9a\)bc | |
cisco | ios | 12.3\(9a\)bc2 | |
cisco | ios | 12.3\(9a\)bc6 | |
cisco | ios | 12.3\(9a\)bc7 | |
cisco | ios | 12.3\(9d\) | |
cisco | ios | 12.3\(9e\) | |
cisco | ios | 12.3\(10\) | |
cisco | ios | 12.3\(10c\) | |
cisco | ios | 12.3\(10d\) | |
cisco | ios | 12.3\(10e\) | |
cisco | ios | 12.3\(11\) | |
cisco | ios | 12.3\(11\)t | |
cisco | ios | 12.3\(11\)t4 | |
cisco | ios | 12.3\(11\)t5 | |
cisco | ios | 12.3\(11\)t6 | |
cisco | ios | 12.3\(11\)t8 | |
cisco | ios | 12.3\(11\)t9 | |
cisco | ios | 12.3\(11\)xl | |
cisco | ios | 12.3\(11\)xl3 | |
cisco | ios | 12.3\(11\)yf | |
cisco | ios | 12.3\(11\)yf2 | |
cisco | ios | 12.3\(11\)yf3 | |
cisco | ios | 12.3\(11\)yf4 | |
cisco | ios | 12.3\(11\)yj | |
cisco | ios | 12.3\(11\)yk | |
cisco | ios | 12.3\(11\)yk1 | |
cisco | ios | 12.3\(11\)yk2 | |
cisco | ios | 12.3\(11\)yl | |
cisco | ios | 12.3\(11\)yn | |
cisco | ios | 12.3\(11\)yr | |
cisco | ios | 12.3\(11\)ys | |
cisco | ios | 12.3\(11\)ys1 | |
cisco | ios | 12.3\(11\)yw | |
cisco | ios | 12.3\(12\) | |
cisco | ios | 12.3\(12b\) | |
cisco | ios | 12.3\(12e\) | |
cisco | ios | 12.3\(13\) | |
cisco | ios | 12.3\(13a\) | |
cisco | ios | 12.3\(13a\)bc | |
cisco | ios | 12.3\(13a\)bc1 | |
cisco | ios | 12.3\(13b\) | |
cisco | ios | 12.3\(14\)t | |
cisco | ios | 12.3\(14\)t2 | |
cisco | ios | 12.3\(14\)t4 | |
cisco | ios | 12.3\(14\)t5 | |
cisco | ios | 12.3\(14\)ym4 | |
cisco | ios | 12.3\(14\)yq | |
cisco | ios | 12.3\(14\)yq1 | |
cisco | ios | 12.3\(14\)yq3 | |
cisco | ios | 12.3\(14\)yq4 | |
cisco | ios | 12.3\(14\)yt | |
cisco | ios | 12.3\(14\)yt1 | |
cisco | ios | 12.3\(14\)yu | |
cisco | ios | 12.3\(14\)yu1 | |
cisco | ios | 12.3\(15\) | |
cisco | ios | 12.3\(15b\) | |
cisco | ios | 12.3\(16\) | |
cisco | ios | 12.3b | |
cisco | ios | 12.3bc | |
cisco | ios | 12.3bw | |
cisco | ios | 12.3j | |
cisco | ios | 12.3ja | |
cisco | ios | 12.3jea | |
cisco | ios | 12.3jeb | |
cisco | ios | 12.3jec | |
cisco | ios | 12.3jed | |
cisco | ios | 12.3jk | |
cisco | ios | 12.3jl | |
cisco | ios | 12.3jx | |
cisco | ios | 12.3t | |
cisco | ios | 12.3tpc | |
cisco | ios | 12.3va | |
cisco | ios | 12.3xa | |
cisco | ios | 12.3xb | |
cisco | ios | 12.3xc | |
cisco | ios | 12.3xd | |
cisco | ios | 12.3xe | |
cisco | ios | 12.3xf | |
cisco | ios | 12.3xg | |
cisco | ios | 12.3xh | |
cisco | ios | 12.3xi | |
cisco | ios | 12.3xj | |
cisco | ios | 12.3xk | |
cisco | ios | 12.3xl | |
cisco | ios | 12.3xm | |
cisco | ios | 12.3xn | |
cisco | ios | 12.3xq | |
cisco | ios | 12.3xr | |
cisco | ios | 12.3xs | |
cisco | ios | 12.3xt | |
cisco | ios | 12.3xu | |
cisco | ios | 12.3xv | |
cisco | ios | 12.3xw | |
cisco | ios | 12.3xx | |
cisco | ios | 12.3xy | |
cisco | ios | 12.3xz | |
cisco | ios | 12.3ya | |
cisco | ios | 12.3yb | |
cisco | ios | 12.3yc | |
cisco | ios | 12.3yd | |
cisco | ios | 12.3ye | |
cisco | ios | 12.3yf | |
cisco | ios | 12.3yg | |
cisco | ios | 12.3yh | |
cisco | ios | 12.3yi | |
cisco | ios | 12.3yj | |
cisco | ios | 12.3yk | |
cisco | ios | 12.3yl | |
cisco | ios | 12.3ym | |
cisco | ios | 12.3yn | |
cisco | ios | 12.3yq | |
cisco | ios | 12.3yr | |
cisco | ios | 12.3ys | |
cisco | ios | 12.3yt | |
cisco | ios | 12.3yu | |
cisco | ios | 12.3yw | |
cisco | ios | 12.3yx | |
cisco | ios | 12.3yz | |
cisco | ios | 12.3za | |
cisco | ios | 12.4 | |
cisco | ios | 12.4\(1\) | |
cisco | ios | 12.4\(1b\) | |
cisco | ios | 12.4\(1c\) | |
cisco | ios | 12.4\(2\)mr | |
cisco | ios | 12.4\(2\)mr1 | |
cisco | ios | 12.4\(2\)t | |
cisco | ios | 12.4\(2\)t1 | |
cisco | ios | 12.4\(2\)t2 | |
cisco | ios | 12.4\(2\)t3 | |
cisco | ios | 12.4\(2\)t4 | |
cisco | ios | 12.4\(2\)xa | |
cisco | ios | 12.4\(2\)xb | |
cisco | ios | 12.4\(2\)xb2 | |
cisco | ios | 12.4\(3\) | |
cisco | ios | 12.4\(3\)t2 | |
cisco | ios | 12.4\(3a\) | |
cisco | ios | 12.4\(3b\) | |
cisco | ios | 12.4\(3d\) | |
cisco | ios | 12.4\(4\)mr | |
cisco | ios | 12.4\(4\)t | |
cisco | ios | 12.4\(4\)t2 | |
cisco | ios | 12.4\(5\) | |
cisco | ios | 12.4\(5b\) | |
cisco | ios | 12.4\(6\)t | |
cisco | ios | 12.4\(6\)t1 | |
cisco | ios | 12.4\(7\) | |
cisco | ios | 12.4\(7a\) | |
cisco | ios | 12.4\(8\) | |
cisco | ios | 12.4\(9\)t | |
cisco | ios | 12.4\(11\)md | |
cisco | ios | 12.4\(15\)md | |
cisco | ios | 12.4\(22\)md | |
cisco | ios | 12.4\(22\)mda | |
cisco | ios | 12.4\(23\) | |
cisco | ios | 12.4\(24\)md | |
cisco | ios | 12.4\(24\)md1 | |
cisco | ios | 12.4\(24\)md2 | |
cisco | ios | 12.4\(24\)md3 | |
cisco | ios | 12.4\(24\)md4 | |
cisco | ios | 12.4\(24\)mda | |
cisco | ios | 12.4\(24\)t1 | |
cisco | ios | 12.4gc | |
cisco | ios | 12.4ja | |
cisco | ios | 12.4jda | |
cisco | ios | 12.4jdc | |
cisco | ios | 12.4jdd | |
cisco | ios | 12.4jk | |
cisco | ios | 12.4jl | |
cisco | ios | 12.4jma | |
cisco | ios | 12.4jmb | |
cisco | ios | 12.4jx | |
cisco | ios | 12.4md | |
cisco | ios | 12.4mda | |
cisco | ios | 12.4mdb | |
cisco | ios | 12.4mr | |
cisco | ios | 12.4mra | |
cisco | ios | 12.4mrb | |
cisco | ios | 12.4sw | |
cisco | ios | 12.4t | |
cisco | ios | 12.4xa | |
cisco | ios | 12.4xb | |
cisco | ios | 12.4xc | |
cisco | ios | 12.4xd | |
cisco | ios | 12.4xe | |
cisco | ios | 12.4xf | |
cisco | ios | 12.4xg | |
cisco | ios | 12.4xj | |
cisco | ios | 12.4xk | |
cisco | ios | 12.4xl | |
cisco | ios | 12.4xm | |
cisco | ios | 12.4xn | |
cisco | ios | 12.4xp | |
cisco | ios | 12.4xq | |
cisco | ios | 12.4xr | |
cisco | ios | 12.4xt | |
cisco | ios | 12.4xv | |
cisco | ios | 12.4xw | |
cisco | ios | 12.4xy | |
cisco | ios | 12.4xz | |
cisco | ios | 12.4ya | |
cisco | ios | 12.4yb | |
cisco | ios | 12.4yd | |
cisco | ios | 12.4ye | |
cisco | ios | 12.4yg | |
cisco | aironet_1040 | - | |
cisco | aironet_1140 | - | |
cisco | aironet_1260 | - | |
cisco | aironet_3500 | - | |
cisco | aironet_3600 | - | |
cisco | aironet_600_office_extend | - | |
cisco | aironet_ap1100 | * | |
cisco | aironet_ap1130ag | * | |
cisco | aironet_ap1131 | * | |
cisco | aironet_ap1200 | * | |
cisco | aironet_ap1230ag | * | |
cisco | aironet_ap1240 | * | |
cisco | aironet_ap1240ag | * | |
cisco | aironet_ap1300 | * | |
cisco | aironet_ap1400 | * | |
cisco | aironet_ap340 | * | |
cisco | aironet_ap340 | 11.21 | |
cisco | aironet_ap350 | * | |
cisco | aironet_ap350 | 11.21 | |
cisco | aironet_bridge_350 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C2928F8-6C6B-4C3F-BBE7-EAE8A0C47E77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja:*:*:*:*:*:*:*", "matchCriteriaId": "5BC51475-7819-4C46-AF3C-251520C3EEFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*", "matchCriteriaId": "B5538B7E-6AB4-4DB5-920F-EC2BA61DF73A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk:*:*:*:*:*:*:*", "matchCriteriaId": "C8011951-B642-4706-8936-74DCB59304C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*", "matchCriteriaId": "042B6178-F186-40F3-A1AB-51AEAFCB7244", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "19940BFF-0888-4717-AC5F-87A85BE165A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)t8:*:*:*:*:*:*:*", "matchCriteriaId": "35C4D3D1-5E63-4A1E-BF9B-588FFE5790B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa4:*:*:*:*:*:*:*", "matchCriteriaId": "D94D6CD6-3AF5-4CC6-991D-3D8C229A1C16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa5:*:*:*:*:*:*:*", "matchCriteriaId": "60704633-BFAB-486F-A613-A806733E9AB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*", "matchCriteriaId": "9E5A2A58-D7B2-4018-BAAE-D6CB49A3A709", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*", "matchCriteriaId": "1C268494-F83A-488D-AEE6-AF7D319B6F64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc3:*:*:*:*:*:*:*", "matchCriteriaId": "484207D7-0AC2-48B6-B86F-182651B6BBB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc4:*:*:*:*:*:*:*", "matchCriteriaId": "0CC53452-31E6-4C9D-88DF-4AD17609DBFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe3:*:*:*:*:*:*:*", "matchCriteriaId": "5BF6C6D9-A2BD-469E-AA75-18C063A435D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*", "matchCriteriaId": "6BE48276-21BF-4275-8512-4C5401423064", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "40DD5508-B8BF-435C-B316-42FEDDDBA859", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*", "matchCriteriaId": "114B5329-6A76-4BE9-AA57-3463D614D495", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "CDC06EA9-D4D9-42EE-8A98-598356707894", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)eo1:*:*:*:*:*:*:*", "matchCriteriaId": "8FF2F9E9-AA00-4A78-A32C-14CAA1C171A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja:*:*:*:*:*:*:*", "matchCriteriaId": "2DEA47B2-B51E-4C9C-A9C7-DFC680B32986", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja1:*:*:*:*:*:*:*", "matchCriteriaId": "A2530834-81C3-4524-A4F0-B4F77DBAEB65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "68BCC003-3F88-4369-A387-6B8D0FDFBE32", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "8DD45AA0-EEE1-43FF-B04D-4063769D71AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "7873D1DB-80D0-4076-8716-7618D7161EE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "DF292613-B9BC-4CF1-A6FA-4AFC077D8632", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t4:*:*:*:*:*:*:*", "matchCriteriaId": "208EF5CB-8131-443A-928B-391104DC1C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t8:*:*:*:*:*:*:*", "matchCriteriaId": "3115134B-46F9-40F0-9ABD-3F35EE635EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11a:*:*:*:*:*:*:*", "matchCriteriaId": "0B810AFB-3555-4882-B12B-9DA52AD37AC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*", "matchCriteriaId": "23B1AF9D-106A-43CB-972C-5E85ADFC355D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*", "matchCriteriaId": "25C6BBA6-8D45-4BA7-B88E-44D9ECE88009", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*", "matchCriteriaId": "C1D460AE-3B86-4178-A9D4-172AD4AF1DF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xe4:*:*:*:*:*:*:*", "matchCriteriaId": "552EB570-BFD6-4BBE-805B-41A9A5AE35B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg1:*:*:*:*:*:*:*", "matchCriteriaId": "A6DFEF95-E48F-4586-9D70-89C192FD21E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg2:*:*:*:*:*:*:*", "matchCriteriaId": "77E1EA17-0717-4715-9F2E-48264E18885B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg4:*:*:*:*:*:*:*", "matchCriteriaId": "DACA1E35-3681-4E2C-BAB2-DAD99F24F8DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg5:*:*:*:*:*:*:*", "matchCriteriaId": "6EB85916-14A8-4D16-8BE0-D99B8E5B020E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xh:*:*:*:*:*:*:*", "matchCriteriaId": "6BC5ED4F-1905-4EAA-8AFF-BC50B879725C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk:*:*:*:*:*:*:*", "matchCriteriaId": "F672CDF2-ACC2-485E-89C6-42E47974C8C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*", "matchCriteriaId": "09C47064-BDD5-4EE7-BAB1-E8FE21EB7DE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*", "matchCriteriaId": "AC204B9A-1C01-4900-B515-5796B0B06E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk4:*:*:*:*:*:*:*", "matchCriteriaId": "79A06F5D-ADA4-44C6-84EA-7229428B7AE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq:*:*:*:*:*:*:*", "matchCriteriaId": "67151B56-DD5F-4384-9651-FA927CE73D08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq1:*:*:*:*:*:*:*", "matchCriteriaId": "111C62A4-9DF0-4317-9F95-0112BE24D727", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CF0189B-964F-46EC-BE5F-8076CFE7AB8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5\\)b1:*:*:*:*:*:*:*", "matchCriteriaId": "691E3441-AF70-4959-BBA0-60F5328F8FF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "53430E70-FBAD-42F7-8614-7AB04E566810", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*", "matchCriteriaId": "B670057C-7A86-4F61-8FF5-88E6BFE2B5F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*", "matchCriteriaId": "5FC9F410-782A-416C-9E10-AF43D5BD44FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*", "matchCriteriaId": "27107AB2-87AB-4909-9F6D-352BA94F8032", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "4403BFFB-8A89-4512-8030-5DEDC0C0FF93", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE38549C-107E-4350-90F2-BA928E3872AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5e\\):*:*:*:*:*:*:*", "matchCriteriaId": "7601422B-1C22-44D2-A398-1586814A9F7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(5f\\):*:*:*:*:*:*:*", "matchCriteriaId": "40B9FEE8-FFBB-46E6-A1EA-A243A0073853", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D9B4FE3-7A03-430F-AE68-743559D74DEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F5C4FD2-E4BC-447D-8B3B-0248BFBE9121", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(6d\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BBFB86-2745-4817-9516-50CB08AAA82D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(6e\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F645CEE-083C-412E-BCEF-2761AC266CD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(6f\\):*:*:*:*:*:*:*", "matchCriteriaId": "B5CCD5B9-0771-47B3-A280-6566A489A5AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*", "matchCriteriaId": "56529125-65D8-4900-A741-0AE18852B7A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja1:*:*:*:*:*:*:*", "matchCriteriaId": "4DF14EE4-1D49-4E1B-9589-2F3A8BF3E3E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx:*:*:*:*:*:*:*", "matchCriteriaId": "3029C050-D02D-4DA3-B8B9-901F808BBDD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "1BEADF66-3434-41E0-9527-4D97F1836A76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t4:*:*:*:*:*:*:*", "matchCriteriaId": "C3C82EB5-8397-4C0D-8074-7B55D83708B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*", "matchCriteriaId": "E6735142-065C-4AA2-B78A-FCD7CA8CB50F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*", "matchCriteriaId": "337C0195-34F6-4683-A944-2F698A677476", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t10:*:*:*:*:*:*:*", "matchCriteriaId": "75901574-5BDD-4388-96F9-A2B4E9970F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t12:*:*:*:*:*:*:*", "matchCriteriaId": "6BBCC011-54AB-4E8E-BC20-68E6F274D323", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3:*:*:*:*:*:*:*", "matchCriteriaId": "FD0A3B5B-4E6B-437A-B355-D9DCDF078201", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi4:*:*:*:*:*:*:*", "matchCriteriaId": "689D066C-972F-4868-A6A3-2F5522489D89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*", "matchCriteriaId": "63CA13FE-93EF-414A-A8D5-333D4A5B9320", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr3:*:*:*:*:*:*:*", "matchCriteriaId": "B19F9376-BE29-4F08-B86F-E1634FF750F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr4:*:*:*:*:*:*:*", "matchCriteriaId": "68DC1732-CED8-4FA6-9A75-000BABBEA5C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr6:*:*:*:*:*:*:*", "matchCriteriaId": "570AF3F9-D3F5-44B1-82A1-3C7966A27BD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(7.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5719F49C-0BCC-40F9-825A-4C3C9D4D2239", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja:*:*:*:*:*:*:*", "matchCriteriaId": "4701FFB8-6361-4B0F-B413-2649A6FC650E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*", "matchCriteriaId": "80CC4D9F-F7C1-4887-BDC6-62F4BDFE5079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t4:*:*:*:*:*:*:*", "matchCriteriaId": "21932884-D10B-4C2D-99C5-ED4DE3DA38E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t7:*:*:*:*:*:*:*", "matchCriteriaId": "AC4C56D7-435E-4AE3-BAE8-96A6EAB57488", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t8:*:*:*:*:*:*:*", "matchCriteriaId": "C44A3B72-EFF5-460D-8EE0-13782AAFDB20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*", "matchCriteriaId": "378FFEBE-3815-4293-943E-86771AB6D63D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*", "matchCriteriaId": "BDB99DAF-0BF1-43FE-8263-AF8F5EEA7D59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xu2:*:*:*:*:*:*:*", "matchCriteriaId": "B78D2BD4-CD3F-40D2-8F0F-FC765A9B1ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy4:*:*:*:*:*:*:*", "matchCriteriaId": "A66A1B2C-D653-4275-ADC5-6298A70C939D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*", "matchCriteriaId": "76DFDE5D-231C-4B79-85CF-2B2097E12437", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy6:*:*:*:*:*:*:*", "matchCriteriaId": "BA6F2B19-7FF1-45E7-91B6-A427343099DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)ya1:*:*:*:*:*:*:*", "matchCriteriaId": "64F0AD5B-4C2D-4C9D-8207-0A67F9AF995A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yd:*:*:*:*:*:*:*", "matchCriteriaId": "B91192EA-0320-43D1-8D73-FAD57CC18259", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yf:*:*:*:*:*:*:*", "matchCriteriaId": "7CC57A97-0A3C-466F-AA15-5D97AC528503", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*", "matchCriteriaId": "581D9245-944E-4464-924B-6CB1E874FFEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*", "matchCriteriaId": "FE205377-1B09-4498-8538-F2B7DF91E579", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg2:*:*:*:*:*:*:*", "matchCriteriaId": "ADBBB1FA-5FA9-4042-AE12-F39307C27F8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg3:*:*:*:*:*:*:*", "matchCriteriaId": "8108DEF0-102A-452B-9B94-D5AAA3918322", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yh:*:*:*:*:*:*:*", "matchCriteriaId": "B4666469-0A0F-4D28-8A1E-39D82ED210CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi:*:*:*:*:*:*:*", "matchCriteriaId": "61130D36-B1EF-41F1-AF14-57475BE25FB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi1:*:*:*:*:*:*:*", "matchCriteriaId": "AAD8A9BF-F084-447C-B28C-2736E8C3A83D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi3:*:*:*:*:*:*:*", "matchCriteriaId": "A515A997-5922-4C07-9C68-0D071E811F2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "21837255-F23B-488A-A9FB-ED984020147D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc:*:*:*:*:*:*:*", "matchCriteriaId": "51F92965-6498-40EC-8AF7-D31466F973A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*", "matchCriteriaId": "9417A9B3-CAD8-4E69-9871-484DED263683", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc6:*:*:*:*:*:*:*", "matchCriteriaId": "39601936-034D-4F48-9F02-0F0E251E34F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc7:*:*:*:*:*:*:*", "matchCriteriaId": "F3761893-292D-41E8-9800-C888B235E6F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9d\\):*:*:*:*:*:*:*", "matchCriteriaId": "57EE4026-2A06-4E63-924C-43E663EA47DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(9e\\):*:*:*:*:*:*:*", "matchCriteriaId": "DAF8B6B9-3023-4C33-AFB1-C8C4E1504178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "697C9EFC-7B70-438F-A418-AEFA22841655", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(10c\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FF6B0F5-0E61-4ECC-B329-80ABCAED3057", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*", "matchCriteriaId": "19F6275E-146F-4B70-B14C-D857DDA13819", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(10e\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F590204-33CC-4A6A-9C37-380ADC15813A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "EDCFFDE0-284E-4107-98DA-C30724E4BF82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "CE4F50FF-2A42-4BE6-84D8-C6C2A5938125", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*", "matchCriteriaId": "B48ACEA8-6E12-40CF-868B-DE343BEBFE41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t5:*:*:*:*:*:*:*", "matchCriteriaId": "71775098-8BA1-442F-9709-0BCE255DD773", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t6:*:*:*:*:*:*:*", "matchCriteriaId": "8355DB7C-2E2C-4108-BD0F-361B0B898D1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*", "matchCriteriaId": "D80E065F-ABB5-4824-9C59-A53690B0CD1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*", "matchCriteriaId": "4A4E3DC5-0F83-42DE-9482-92DB413DCDE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*", "matchCriteriaId": "C63FEE13-5E2A-4011-B720-63EFAFF55049", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl3:*:*:*:*:*:*:*", "matchCriteriaId": "81FACB05-B13D-494E-8AA3-5590391E6F88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf:*:*:*:*:*:*:*", "matchCriteriaId": "84E27655-2889-4B2A-9C48-ADD48ED5B365", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*", "matchCriteriaId": "7F58FC83-C321-4A9F-8EE2-1531B73E064C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*", "matchCriteriaId": "4C7D8166-6522-437F-AEDE-2AC02913FC87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf4:*:*:*:*:*:*:*", "matchCriteriaId": "B805F909-5650-4884-9990-F3776DF203AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yj:*:*:*:*:*:*:*", "matchCriteriaId": "C705B7F5-2BE4-45F9-8B5F-9FAC900FF6D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk:*:*:*:*:*:*:*", "matchCriteriaId": "F5610D63-0E50-4AB3-A6F7-36BCF7F69EF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk1:*:*:*:*:*:*:*", "matchCriteriaId": "17F5092A-473E-4356-9EFB-9E3EBFCD5F13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*", "matchCriteriaId": "DF310185-68F5-48BB-8E11-E38E1961B380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*", "matchCriteriaId": "19E24302-D04B-45D1-AC6A-0CE45F9B9F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yn:*:*:*:*:*:*:*", "matchCriteriaId": "723B58EA-9686-425C-99DD-FBECDF6E2225", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yr:*:*:*:*:*:*:*", "matchCriteriaId": "E3EA745A-8AFE-4461-AB53-1FC71E080BC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys:*:*:*:*:*:*:*", "matchCriteriaId": "E109B3D5-90BB-45B6-8265-B32465AC85E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys1:*:*:*:*:*:*:*", "matchCriteriaId": "C441F423-86ED-49DF-8BFC-3CA988C9177A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yw:*:*:*:*:*:*:*", "matchCriteriaId": "68D39082-D9B4-4AD2-BA93-D688E098F037", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4F0BFAB-D26C-4D17-B5AB-647780423E8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(12b\\):*:*:*:*:*:*:*", "matchCriteriaId": "E59A3B6E-59F6-47B1-BC28-C0B171F1E1F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(12e\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B3FBFC2-0628-4A56-A96C-904807E85B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B69920A-6775-4D3B-81A8-F971875C43D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4093FE1B-3B95-4F25-AAF5-329FEBE0F0E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc:*:*:*:*:*:*:*", "matchCriteriaId": "B9411EF8-54EF-49CB-BA09-3AE1133D3146", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc1:*:*:*:*:*:*:*", "matchCriteriaId": "71AA815E-CD4A-44D5-A772-93CB340E7998", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(13b\\):*:*:*:*:*:*:*", "matchCriteriaId": "31AB99B6-84C5-426A-A037-5022FD00E6C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "D32302AE-54E2-423A-A418-6C7EAE2CDF0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "6F616AE0-42B4-403B-B610-99DE15EE490D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*", "matchCriteriaId": "EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*", "matchCriteriaId": "68A83281-667D-4D1A-9F76-CFF3E5AD560F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*", "matchCriteriaId": "40FD8309-111A-45BC-819A-99FE9E002ACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*", "matchCriteriaId": "42C7F308-DB1C-4500-81E4-9E3325D58A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*", "matchCriteriaId": "FCD9C9A9-9B90-479A-9D2D-8681056892AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq3:*:*:*:*:*:*:*", "matchCriteriaId": "19661048-2B60-437E-9D56-9189BFC4C8F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq4:*:*:*:*:*:*:*", "matchCriteriaId": "FF870144-DFCD-4ADC-A695-3DF9266890EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt:*:*:*:*:*:*:*", "matchCriteriaId": "D389A57A-005E-40B1-8DFC-3347F67F19F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt1:*:*:*:*:*:*:*", "matchCriteriaId": "FC7CEBAF-65BB-4A89-8C3B-CEF1052D99E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu:*:*:*:*:*:*:*", "matchCriteriaId": "3B311DEA-F602-49DA-8208-353D2D33283F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*", "matchCriteriaId": "A14407B6-FEC1-4FD8-8359-CA3EC5477B13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "CD190476-DC7A-4033-9149-062D75704AD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(15b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4510B95-F9F7-4407-B00F-F91B352C99C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "E236CDE4-3369-4CDF-B0F0-4888610CCFC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", "matchCriteriaId": "40183EF8-BD19-49AD-9E55-7FCCA635327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", "matchCriteriaId": "B8E40D5D-F46E-4098-A46A-1A52A343310D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*", "matchCriteriaId": "550709E5-9302-4FCB-A969-2DA54BCB2184", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "matchCriteriaId": "D73E5138-016A-48EC-A367-3D3285AAFED2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", "matchCriteriaId": "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", "matchCriteriaId": "9CD5C082-9730-466D-A4A8-E4EEE5F3730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", "matchCriteriaId": "8CF419BD-8474-4F33-9CDD-587E341ABA8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jed:*:*:*:*:*:*:*", "matchCriteriaId": "FEA9DE9B-EE39-41E4-A4CF-C9088CFE14AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*", "matchCriteriaId": "332B0446-4D8B-414B-B572-84B45D5643AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*", "matchCriteriaId": "BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*", "matchCriteriaId": "D40FB896-E20C-46B1-BF59-FBB42295F9C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*", "matchCriteriaId": "841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*", "matchCriteriaId": "B418CFDD-AF36-46F9-B347-B34E72100F95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", "matchCriteriaId": "84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", "matchCriteriaId": "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*", "matchCriteriaId": "E2E3044F-3CE8-4970-9A7F-FDF555F622A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", "matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", "matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*", "matchCriteriaId": "AB57AAA9-4715-468F-A734-A12209A6069F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*", "matchCriteriaId": "480D480A-80A3-4113-A1A6-194A8DD47F65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", "matchCriteriaId": "98FE195E-084B-4F4C-800D-850165DED48C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*", "matchCriteriaId": "1A310F30-F94D-4A70-94BD-6B94D7B5F5B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*", "matchCriteriaId": "72732395-1B82-4E4F-9D63-D1CA0C6BD929", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", "matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", "matchCriteriaId": "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*", "matchCriteriaId": "56032FBD-FEE7-4B38-B35E-CD277B931DE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*", "matchCriteriaId": "75CF930C-6871-4BCB-8605-B71F82455123", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", "matchCriteriaId": "520304A4-EB15-42A8-A402-8251A4D2076D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*", "matchCriteriaId": "F80A9B6F-A5D8-403C-9018-0E627FBC9A0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", "matchCriteriaId": "139B1182-61A3-4F3D-9E29-758F27917646", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", "matchCriteriaId": "0CC3706F-B00A-405E-917E-7FD5217E0501", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", "matchCriteriaId": "1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*", "matchCriteriaId": "6F2BCA9F-5D56-4EF4-8675-7B76129B994B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", "matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*", "matchCriteriaId": "09698AAF-F4D1-41EE-A960-38FAB645B5FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*", "matchCriteriaId": "1B75FC35-2B4D-4CEE-BE71-D497DF787123", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", "matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*", "matchCriteriaId": "F8711A47-ABD5-40ED-847A-8D1663E3D819", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", "matchCriteriaId": "1938D118-C07F-4BEC-8030-947F099BFCB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*", "matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "65B65738-134F-4C1A-916B-D6CD6365CB43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5331586-8380-4F77-8735-17EC0D0E503A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*", "matchCriteriaId": "AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*", "matchCriteriaId": "35536E91-A58D-40F7-A256-34128E64B920", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "0F69329B-4D37-428E-B467-E3B9314A4D61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "9615B275-5748-46CC-8A77-4A9550A39050", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "421CD923-6282-4404-A642-C04E1F57F12F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*", "matchCriteriaId": "AD4411CB-5EE9-455C-AE90-1770320EFD86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*", "matchCriteriaId": "593D1680-4883-43FE-A925-B87ED1D2E785", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*", "matchCriteriaId": "FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*", "matchCriteriaId": "EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*", "matchCriteriaId": "90769378-BBD1-48D0-921C-A79413B99CE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C6DF704-8CC8-42C3-83F1-4D38734DEAEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "E636DC68-59FE-4BA0-BCFC-4DA97EE17B23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7E0D6801-E9A8-416B-830B-7682A9AF65BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "23265E4D-855C-4CCC-A875-DFCBA55B3CB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*", "matchCriteriaId": "2EB86291-EB40-4CFD-A424-898EFB3D518B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "A10AADAC-4687-4308-8E4F-B7F9549556DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "1A747987-5218-4C1E-87C4-0675CD4F7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B6483CB-7838-45F7-AE28-824AD71172A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "04759B1E-8B40-460F-B33F-4E6332CFC31D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "08AF3694-9686-444B-8D92-E41D262F74E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "C5595E7D-3CFD-4FF2-A6BE-59645058C54F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4235428-5E2E-4BCB-98B7-8844B19C7AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A1E17AB-F645-4636-9337-3158556E85A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "86150D11-94D7-43F9-9D19-33778558255F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "EDC43701-8A3A-42FB-B4F5-566DE59E542E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(11\\)md:*:*:*:*:*:*:*", "matchCriteriaId": "92AD4889-F6B6-4497-A589-8632A1850965", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(15\\)md:*:*:*:*:*:*:*", "matchCriteriaId": "DE0233F4-AA5D-47C3-934A-4BA793DD4A2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md:*:*:*:*:*:*:*", "matchCriteriaId": "498A43E2-5A03-46C9-B60D-8E7CE79F1705", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda:*:*:*:*:*:*:*", "matchCriteriaId": "6EB30791-A691-42DD-8714-B173242EDBBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(23\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A3B5CC3-A83E-4241-ACE1-0FFEE8A5EFE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md:*:*:*:*:*:*:*", "matchCriteriaId": "539454C8-EA90-4146-9429-72465CF555FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md1:*:*:*:*:*:*:*", "matchCriteriaId": "4E44F5F4-D7FE-4B9C-BA65-2365EF7A8092", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md2:*:*:*:*:*:*:*", "matchCriteriaId": "9548BCBF-0E01-41F8-A6BA-D70032340C73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md3:*:*:*:*:*:*:*", "matchCriteriaId": "B9BF1BB8-EAB1-46C9-BD36-73E502619C88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md4:*:*:*:*:*:*:*", "matchCriteriaId": "34F23388-1B0B-4708-85F4-5A8B7359C1B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda:*:*:*:*:*:*:*", "matchCriteriaId": "D0F2A946-AD8A-4644-8630-5951B66E4B34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "2A6AD6E5-EBB0-44D8-A63C-EFF7260E4CC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*", "matchCriteriaId": "89B19F2B-1D89-42FC-89A7-737D8109EB1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "matchCriteriaId": "4EB2B390-A39F-4082-BBCB-712BDD95886D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "matchCriteriaId": "5F782741-0F18-4FBC-9D00-AAABB8BC6A10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jdc:*:*:*:*:*:*:*", "matchCriteriaId": "CA60D334-B2F6-4F34-9EE1-C8F45DB3C441", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jdd:*:*:*:*:*:*:*", "matchCriteriaId": "FD178B67-B9E7-4725-B553-E5ACBCE296D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "matchCriteriaId": "ACB11851-BCF8-485B-91F9-6A39B2354826", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "matchCriteriaId": "65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "matchCriteriaId": "3DFE3FC0-79BC-4549-98BA-235A53719F82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*", "matchCriteriaId": "4691CEAD-47F1-4A97-84A4-72B794D3F714", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "matchCriteriaId": "B4A28452-000C-4BBB-A34E-1AA63D69925D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*", "matchCriteriaId": "237F6EDD-AB47-4768-9C75-C0B03E23696B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mdb:*:*:*:*:*:*:*", "matchCriteriaId": "620B4962-1EA7-478F-AA0A-06DC7ED83B76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mra:*:*:*:*:*:*:*", "matchCriteriaId": "860A1477-49B5-4356-9D83-A1A092233D55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mrb:*:*:*:*:*:*:*", "matchCriteriaId": "B2580FA9-24EA-4A7A-839F-3C6E7FE69ED0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "matchCriteriaId": "7D1CD80F-E898-41CE-8A86-28C2F48B928A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "matchCriteriaId": "78260223-50C0-48F8-9A65-AE67489E602C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "matchCriteriaId": "18E39462-4CEE-4C29-8B60-50E05FCF3E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "matchCriteriaId": "3FF16123-CCA0-4ECD-9B8C-AC1534C3F244", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "matchCriteriaId": "CC7454AF-7610-4CD3-BD2B-95A6C3283811", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*", "matchCriteriaId": "CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*", "matchCriteriaId": "AC90BE87-EB54-46F8-A1FD-8F4E553C69F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "matchCriteriaId": "883FA166-2973-42BA-842D-28FBDBFEAC4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "matchCriteriaId": "4362045B-7065-4FF9-A977-B3DA7894F831", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "matchCriteriaId": "BC27E79D-6B4B-4839-9664-DFE821C45C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "matchCriteriaId": "4963A243-74FA-43AD-9645-C9FAD527A6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*", "matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*", "matchCriteriaId": "E67621EA-25D8-47C2-ADEA-512E38F2FFE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*", "matchCriteriaId": "94E1421B-2B86-41B2-9288-59780E081337", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*", "matchCriteriaId": "51A5F5FF-6BC4-4A1E-B9F1-BD47096D30B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*", "matchCriteriaId": "6D910556-9518-45C5-9891-1541760B0920", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*", "matchCriteriaId": "7361553C-439A-4EFC-B47C-5D099132A9BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*", "matchCriteriaId": "42E54595-DEA2-4CDA-B218-89B034EB129F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*", "matchCriteriaId": "900C8376-9891-4CAF-8873-1CE78CFEB050", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "D385DFB0-FE3D-4217-B17A-1AB4A34363AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*", "matchCriteriaId": "903A79E0-184A-4CFB-96FA-A3E0474503FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA740581-ED86-4822-9516-BCCA4C267561", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA8DE4-4E1D-4286-846D-0381BF68632F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*", "matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*", "matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*", "matchCriteriaId": "3E8F1355-5A18-4692-B54C-083291E751E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*", "matchCriteriaId": "97943532-2C6A-4867-BD40-1B848BD2009A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_bridge_350:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF85A77B-4BFA-427B-A6AC-33BD44DFA06A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426." }, { "lang": "es", "value": "Cisco IOS v12.3 y v12.4 en puntos de acceso Aironet permite a atacantes remotos provocar una denegaci\u00f3n de servicio (radio-interface input-queue hang) a trav\u00e9s de IAPP 0x3281 paquetes, tambi\u00e9n conocido como Bug ID CSCtc12426." } ], "id": "CVE-2012-1350", "lastModified": "2024-11-21T01:36:50.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-06T18:55:00.977", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-15 02:59
Modified
2024-11-21 02:18
Severity ?
Summary
Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | - | |
cisco | aironet_1040 | - | |
cisco | aironet_1140 | - | |
cisco | aironet_1260 | - | |
cisco | aironet_3500 | - | |
cisco | aironet_3600 | - | |
cisco | aironet_3600e | - | |
cisco | aironet_3600i | - | |
cisco | aironet_3600p | - | |
cisco | aironet_600_office_extend | - | |
cisco | aironet_ap1100 | * | |
cisco | aironet_ap1130ag | * | |
cisco | aironet_ap1131 | * | |
cisco | aironet_ap1200 | * | |
cisco | aironet_ap1230ag | * | |
cisco | aironet_ap1240 | * | |
cisco | aironet_ap1240ag | * | |
cisco | aironet_ap1300 | * | |
cisco | aironet_ap1400 | * | |
cisco | aironet_ap340 | * | |
cisco | aironet_ap340 | 11.21 | |
cisco | aironet_ap350 | * | |
cisco | aironet_ap350 | 11.21 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*", "matchCriteriaId": "7361553C-439A-4EFC-B47C-5D099132A9BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*", "matchCriteriaId": "42E54595-DEA2-4CDA-B218-89B034EB129F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*", "matchCriteriaId": "900C8376-9891-4CAF-8873-1CE78CFEB050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "D385DFB0-FE3D-4217-B17A-1AB4A34363AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*", "matchCriteriaId": "35E201F1-02D0-4023-9A50-3D8F1A9EC357", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CBE08A-4F2B-452D-B3B3-034DE13E86CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE92197-190B-466A-B7A7-268051DA4395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*", "matchCriteriaId": "903A79E0-184A-4CFB-96FA-A3E0474503FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA740581-ED86-4822-9516-BCCA4C267561", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA8DE4-4E1D-4286-846D-0381BF68632F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*", "matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*", "matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*", "matchCriteriaId": "3E8F1355-5A18-4692-B54C-083291E751E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*", "matchCriteriaId": "97943532-2C6A-4867-BD40-1B848BD2009A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS on Aironet access points, when \"dot11 aaa authenticator\" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509." }, { "lang": "es", "value": "Cisco IOS en puntos de acceso Aironet, cuando la depuraci\u00f3n est\u00e1 habilitada en \u0027dot11 aaa authenticator\u0027, permite a atacantes remotos a causar una denegaci\u00f3n de servicio a trav\u00e9s de un paquete EAP mal-formado, tambi\u00e9n conocido como Bug ID CSCul15509." } ], "id": "CVE-2014-7998", "lastModified": "2024-11-21T02:18:24.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-15T02:59:02.893", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031219" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-15 02:59
Modified
2024-11-21 02:18
Severity ?
Summary
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | - | |
cisco | aironet_1040 | - | |
cisco | aironet_1140 | - | |
cisco | aironet_1260 | - | |
cisco | aironet_3500 | - | |
cisco | aironet_3600 | - | |
cisco | aironet_3600e | - | |
cisco | aironet_3600i | - | |
cisco | aironet_3600p | - | |
cisco | aironet_600_office_extend | - | |
cisco | aironet_ap1100 | * | |
cisco | aironet_ap1130ag | * | |
cisco | aironet_ap1131 | * | |
cisco | aironet_ap1200 | * | |
cisco | aironet_ap1230ag | * | |
cisco | aironet_ap1240 | * | |
cisco | aironet_ap1240ag | * | |
cisco | aironet_ap1300 | * | |
cisco | aironet_ap1400 | * | |
cisco | aironet_ap340 | * | |
cisco | aironet_ap340 | 11.21 | |
cisco | aironet_ap350 | * | |
cisco | aironet_ap350 | 11.21 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*", "matchCriteriaId": "7361553C-439A-4EFC-B47C-5D099132A9BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*", "matchCriteriaId": "42E54595-DEA2-4CDA-B218-89B034EB129F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*", "matchCriteriaId": "900C8376-9891-4CAF-8873-1CE78CFEB050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "D385DFB0-FE3D-4217-B17A-1AB4A34363AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*", "matchCriteriaId": "35E201F1-02D0-4023-9A50-3D8F1A9EC357", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CBE08A-4F2B-452D-B3B3-034DE13E86CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE92197-190B-466A-B7A7-268051DA4395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*", "matchCriteriaId": "903A79E0-184A-4CFB-96FA-A3E0474503FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA740581-ED86-4822-9516-BCCA4C267561", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA8DE4-4E1D-4286-846D-0381BF68632F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*", "matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*", "matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*", "matchCriteriaId": "3E8F1355-5A18-4692-B54C-083291E751E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*", "matchCriteriaId": "97943532-2C6A-4867-BD40-1B848BD2009A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281." }, { "lang": "es", "value": "La implementaci\u00f3n DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condiciones de error con concesiones cortas ni los intentos de renovaci\u00f3n de concesi\u00f3n sin \u00e9xito, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) mediante la activaci\u00f3n de una transici\u00f3n a un estado de recuperaci\u00f3n con la intenci\u00f3n de provocar un reinicio de la interfaz de red, pero en realidad implica un reinicio completo del dispositivo, tambi\u00e9n conocido como Bug ID CSCtn16281." } ], "id": "CVE-2014-7997", "lastModified": "2024-11-21T02:18:24.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-15T02:59:01.517", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031218" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-27 17:30
Modified
2024-11-21 01:06
Severity ?
Summary
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | aironet_ap1100 | * | |
cisco | aironet_ap1200 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network." }, { "lang": "es", "value": "Los dispositivos Cisco Aironet Lightweight Access Point (AP) env\u00edan el contenido de ciertos paquetes de multidifusi\u00f3n en texto plano, lo que permite a atacantes remotos descubrir las direcciones IP y MAC del Wireless LAN Controller as\u00ed como los detalles de configuraci\u00f3n del Punto de Acceso (AP) espiando la red wireless." } ], "id": "CVE-2009-2976", "lastModified": "2024-11-21T01:06:12.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-27T17:30:00.360", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022774" }, { "source": "cve@mitre.org", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "source": "cve@mitre.org", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-27 17:00
Modified
2024-11-21 01:05
Severity ?
Summary
The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | aironet_ap1100 | * | |
cisco | aironet_ap1200 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664." }, { "lang": "es", "value": "La funcionalidad Over-the-Air Provisioning (OTAP) en dispositivos Cisco Aironet Lightweight Access Point 1100 y 1200 no implementan apropiadamente la asociaci\u00f3n al punto de acceso, lo que permite a los atacantes remoto suplantar un controlador y causar una denegaci\u00f3n de servicio (parada de servicio) a trav\u00e9s de una gesti\u00f3n de paquetes de radio remota (RRM) manipulados, tambi\u00e9n conocidos como \"SkyJack\" o Bug ID CSCtb56664." } ], "id": "CVE-2009-2861", "lastModified": "2024-11-21T01:05:55.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.3, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-27T17:00:01.077", "references": [ { "source": "ykramarz@cisco.com", "url": "http://securitytracker.com/id?1022774" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919" }, { "source": "ykramarz@cisco.com", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "source": "ykramarz@cisco.com", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/36145" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2419" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }