All the vulnerabilites related to cisco - catalyst_4503
cve-2015-0687
Vulnerability from cvelistv5
Published
2015-04-03 01:00
Modified
2024-08-06 04:17
Severity ?
Summary
The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574.
References
http://www.securitytracker.com/id/1032022vdb-entry, x_refsource_SECTRACK
http://tools.cisco.com/security/center/viewAlert.x?alertId=38194vendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:17:32.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032022",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032022"
          },
          {
            "name": "20150402 Cisco Catalyst 4500 SNMP Polling Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-04-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-04-08T17:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1032022",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032022"
        },
        {
          "name": "20150402 Cisco Catalyst 4500 SNMP Polling Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-0687",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032022",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032022"
            },
            {
              "name": "20150402 Cisco Catalyst 4500 SNMP Polling Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-0687",
    "datePublished": "2015-04-03T01:00:00",
    "dateReserved": "2015-01-07T00:00:00",
    "dateUpdated": "2024-08-06T04:17:32.534Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0551
Vulnerability from cvelistv5
Published
2004-06-15 04:00
Modified
2024-08-08 00:24
Severity ?
Summary
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
References
http://www.kb.cert.org/vuls/id/245190third-party-advisory, x_refsource_CERT-VN
http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtmlvendor-advisory, x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/16370vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.408Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#245190",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/245190"
          },
          {
            "name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
          },
          {
            "name": "cisco-catalyst-ack-dos(16370)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#245190",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/245190"
        },
        {
          "name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
        },
        {
          "name": "cisco-catalyst-ack-dos(16370)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0551",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#245190",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/245190"
            },
            {
              "name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
            },
            {
              "name": "cisco-catalyst-ack-dos(16370)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0551",
    "datePublished": "2004-06-15T04:00:00",
    "dateReserved": "2004-06-11T00:00:00",
    "dateUpdated": "2024-08-08T00:24:26.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1100
Vulnerability from cvelistv5
Published
2013-02-13 23:00
Modified
2024-09-16 18:14
Severity ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.711Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-13T23:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1100",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1100",
    "datePublished": "2013-02-13T23:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-16T18:14:13.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-4258
Vulnerability from cvelistv5
Published
2005-12-15 11:00
Modified
2024-08-07 23:38
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/44543vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/15864vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:51.592Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-catalyst-land-dos(44543)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
          },
          {
            "name": "15864",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15864"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "cisco-catalyst-land-dos(44543)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
        },
        {
          "name": "15864",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15864"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4258",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-catalyst-land-dos(44543)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
            },
            {
              "name": "15864",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15864"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4258",
    "datePublished": "2005-12-15T11:00:00",
    "dateReserved": "2005-12-15T00:00:00",
    "dateUpdated": "2024-08-07T23:38:51.592Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2005-12-15 11:03
Modified
2024-11-21 00:03
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Impacted products
Vendor Product Version
cisco catalyst 4.5_\(10\)
cisco catalyst sup2plus
cisco catalyst sup3
cisco catalyst_1200_series *
cisco catalyst_1900_series *
cisco catalyst_1900_series 9.0_0.07
cisco catalyst_2800_series *
cisco catalyst_2820 *
cisco catalyst_2820 9.0_0.07
cisco catalyst_2900 *
cisco catalyst_2900 lre_xl
cisco catalyst_2900 xl
cisco catalyst_2901 *
cisco catalyst_2902 *
cisco catalyst_2920 *
cisco catalyst_2926 *
cisco catalyst_2926f *
cisco catalyst_2926gl *
cisco catalyst_2926gs *
cisco catalyst_2926t *
cisco catalyst_2940 *
cisco catalyst_2948 *
cisco catalyst_2948-ge-tx *
cisco catalyst_2948g-l3 *
cisco catalyst_2950 *
cisco catalyst_2950_lre *
cisco catalyst_2955 *
cisco catalyst_2970 *
cisco catalyst_2980g *
cisco catalyst_2980g-a *
cisco catalyst_3000 *
cisco catalyst_3200 *
cisco catalyst_3500_xl *
cisco catalyst_3550 *
cisco catalyst_3560 *
cisco catalyst_3750 *
cisco catalyst_3750_metro *
cisco catalyst_3900 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4200 *
cisco catalyst_4224 *
cisco catalyst_4232 *
cisco catalyst_4232-13 *
cisco catalyst_4500 *
cisco catalyst_4500 *
cisco catalyst_4503 *
cisco catalyst_4506 *
cisco catalyst_4507r *
cisco catalyst_4510r *
cisco catalyst_4840g *
cisco catalyst_4908g-l3 *
cisco catalyst_4912g *
cisco catalyst_4948 *
cisco catalyst_5000 *
cisco catalyst_5505 *
cisco catalyst_5509 *
cisco catalyst_6000 *
cisco catalyst_6000 *
cisco catalyst_6000 *
cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6000_ws-x6380-nam 2.1\(2\)
cisco catalyst_6000_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6500 *
cisco catalyst_6500_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6500_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6500_ws-x6380-nam 2.1\(2\)
cisco catalyst_6500_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6608 *
cisco catalyst_6624 *
cisco catalyst_7600 *
cisco catalyst_7600 *
cisco catalyst_7600_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_7600_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_7600_ws-x6380-nam 2.1\(2\)
cisco catalyst_7600_ws-x6380-nam 3.1\(1a\)
cisco catalyst_8500 *
cisco catalyst_8510csr *
cisco catalyst_8510msr *
cisco catalyst_8540csr *
cisco catalyst_8540msr *
cisco catalyst_ws-c2924-xl *
cisco catos 3.0\(7\)
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(4b\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 4.5\(10\)
cisco catos 4.5\(11\)
cisco catos 4.5\(12\)
cisco catos 4.5\(13a\)
cisco catos 5.1
cisco catos 5.1\(1\)
cisco catos 5.1\(1a\)
cisco catos 5.1\(2a\)
cisco catos 5.2
cisco catos 5.2\(1\)
cisco catos 5.2\(1a\)
cisco catos 5.2\(2\)
cisco catos 5.2\(3\)
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.3\(1\)csx
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(2\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(5\)
cisco catos 5.5\(6\)
cisco catos 5.5\(7\)
cisco catos 5.5\(13\)
cisco catos 5.5\(19\)
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(1d\)
cisco catos 6.1\(2\)
cisco catos 6.1\(2.13\)
cisco catos 6.1\(3\)
cisco catos 6.2\(0.110\)
cisco catos 6.2\(0.111\)
cisco catos 6.2\(3\)
cisco catos 6.3\(0.7\)pan
cisco catos 6.3\(4\)
cisco catos 6.3\(5\)
cisco catos 6.4\(4a\)
cisco catos 7.1
cisco catos 7.1\(2\)
cisco catos 7.2\(2\)
cisco catos 7.5\(1\)
cisco catos 7.6\(1\)
cisco catos 7.6\(2\)
cisco ios 11.2\(8.2\)sa6
cisco ios 12.0\(5.2\)xu



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7426171-91E9-4369-88F8-469D2D70FF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*",
              "matchCriteriaId": "2795A59A-0157-4EE3-B8B7-946DB7BEACA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF84505D-5736-46AC-8723-230EEB80870F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA369237-AEDC-42C2-BAFA-4FE370A28E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70F6296A-4C3C-4A88-B1A4-3EB971339F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "D89FB0BB-64D2-4385-9302-FDCB05F92345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD87934C-057F-4EB3-9B42-2136A69A5AC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65F67-4C3B-42A2-ACD7-4590FF3125E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBBC2D9-67D3-47FB-A627-7703A5440B34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85876B6F-DE52-4FC2-85E9-3639B2894A90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38034CB-72FD-4E96-A3E3-0B555EC54A7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C3745E0-4918-40AD-A219-111DC81CF766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26EAFC2E-8385-4A04-A761-EC54011A333C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5388120C-0B85-4029-9A6C-EFFD282F23EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC79C1CD-FC2D-4667-A92E-8C87ECE04128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CC7BDB-8C89-43AB-A514-8FC23092DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CFE777F-AC93-4598-A406-C437BB1FFCE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1354FE59-7DB1-4CFE-9149-40EA1CE7B000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C96219-7521-4F11-A222-9BCAB0B9B9D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA122273-0B84-4CE6-AAF6-F89E1F986C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04831AE8-B21E-4674-AD14-9E98AF50D250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*",
              "matchCriteriaId": "87DF7111-AC30-4B16-8EF9-C21E0280808F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*",
              "matchCriteriaId": "FC9179DB-C0A8-4B9C-BC17-B9EA55C9B731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*",
              "matchCriteriaId": "F37FE8BD-1434-4F1D-B207-D5C8E48344AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*",
              "matchCriteriaId": "0F51C943-BBD4-4CAD-8F57-FABECDC469E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8348B895-7B3F-40CB-8843-02DBD28FC6F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27A63C6-255D-449F-B00B-4EB4060ED7E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*",
              "matchCriteriaId": "0EDF42DB-BF41-4C94-8BDB-EB37D90B77EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16867F98-C635-4507-B5A9-BD19181B1E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8473D554-26FD-4D38-92FC-EE3EE2F3D30A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F131955B-CDE7-48BC-9F64-E56BC90F2695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*",
              "matchCriteriaId": "4C6A9A84-B0B4-4560-BF84-9C0C675A37E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*",
              "matchCriteriaId": "8354057B-818A-4BCC-87C3-3EED472B17F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F918F12-DC72-45B0-B776-3F744F12F3D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD2CF99-7556-427B-BCE5-980BBADC4294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
              "matchCriteriaId": "5367C3D5-583A-4942-828F-DD9C8790C93A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
              "matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "793FC8D9-A500-4D21-858F-97CE380C3774",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C0C970-2EB3-489A-AFA5-3066B78D2A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA10A45-3421-48A0-82D7-1605641E0AAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B604D3F1-98B9-487E-8E45-5BAC514689F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4D6201-495A-4EEC-876F-09B58C1D700F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "926FC1F1-C2D1-439C-9A43-B38399A1C363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDFB025-A93A-441C-84B6-EBB0902A5559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1345465E-2B83-40FE-BC6B-536E0A2260D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
              "matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FF76E1E2-3EE9-4560-B138-06347ECA3B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DED72B-DBB7-4E51-AD6D-75EE407A3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97C1243-BBEB-44AC-96E1-AC46F946EA42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
    },
    {
      "lang": "es",
      "value": "Conmutadores  Cisco Catalyst no especificados permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuesti\u00f3n es desconocida; los detalles son obtenidos exclusivamente de BID."
    }
  ],
  "id": "CVE-2005-4258",
  "lastModified": "2024-11-21T00:03:48.883",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-15T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/15864"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/15864"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-13 23:55
Modified
2024-11-21 01:48
Severity ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
Impacted products
Vendor Product Version
cisco ios -
cisco catalyst_2820 *
cisco catalyst_2820 9.0_0.07
cisco catalyst_2900 *
cisco catalyst_2900 lre_xl
cisco catalyst_2900 xl
cisco catalyst_2900_vlan *
cisco catalyst_2900xl *
cisco catalyst_2901 *
cisco catalyst_2902 *
cisco catalyst_2920 *
cisco catalyst_2926 *
cisco catalyst_2926f *
cisco catalyst_2926gl *
cisco catalyst_2926gs *
cisco catalyst_2926t *
cisco catalyst_2940 *
cisco catalyst_2948 *
cisco catalyst_2948-ge-tx *
cisco catalyst_2948g *
cisco catalyst_2948g-l3 *
cisco catalyst_2950 *
cisco catalyst_2950_lre *
cisco catalyst_2955 *
cisco catalyst_2970 *
cisco catalyst_2980g *
cisco catalyst_2980g-a *
cisco catalyst_3000 *
cisco catalyst_3200 *
cisco catalyst_3500 *
cisco catalyst_3500_xl *
cisco catalyst_3500xl *
cisco catalyst_3550 *
cisco catalyst_3560 *
cisco catalyst_3560-e *
cisco catalyst_3560-x *
cisco catalyst_3750 *
cisco catalyst_3750-e *
cisco catalyst_3750-x *
cisco catalyst_3750_metro *
cisco catalyst_3750g *
cisco catalyst_3900 *
cisco catalyst_4000 *
cisco catalyst_4200 *
cisco catalyst_4224 *
cisco catalyst_4232 *
cisco catalyst_4232-13 *
cisco catalyst_4500 *
cisco catalyst_4503 *
cisco catalyst_4506 *
cisco catalyst_4507r *
cisco catalyst_4510r *
cisco catalyst_4840g *
cisco catalyst_4908g-l3 *
cisco catalyst_4912g *
cisco catalyst_4948 *
cisco catalyst_5000 *
cisco catalyst_5500 *
cisco catalyst_5505 *
cisco catalyst_5509 *
cisco catalyst_6000 *
cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6000_ws-x6380-nam 2.1\(2\)
cisco catalyst_6000_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6500 *
cisco catalyst_6500_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6500_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6500_ws-x6380-nam 2.1\(2\)
cisco catalyst_6500_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6503-e -
cisco catalyst_6504-e -
cisco catalyst_6506-e -
cisco catalyst_6509-e -
cisco catalyst_6509-neb-a -
cisco catalyst_6509-v-e -
cisco catalyst_6513 -
cisco catalyst_6513-e -
cisco catalyst_6608 *
cisco catalyst_6624 *
cisco catalyst_7600 *
cisco catalyst_7600_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_7600_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_7600_ws-x6380-nam 2.1\(2\)
cisco catalyst_7600_ws-x6380-nam 3.1\(1a\)
cisco catalyst_8500 *
cisco catalyst_8510csr *
cisco catalyst_8510msr *
cisco catalyst_8540csr *
cisco catalyst_8540msr *
cisco catalyst_ws-c2924-xl *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F65F67-4C3B-42A2-ACD7-4590FF3125E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBBC2D9-67D3-47FB-A627-7703A5440B34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85876B6F-DE52-4FC2-85E9-3639B2894A90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38034CB-72FD-4E96-A3E3-0B555EC54A7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C3745E0-4918-40AD-A219-111DC81CF766",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900_vlan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "643219DD-5795-48F9-899D-19A27A614F90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2900xl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "608C95E6-75D1-4A04-83B4-F9785CD25F79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26EAFC2E-8385-4A04-A761-EC54011A333C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5388120C-0B85-4029-9A6C-EFFD282F23EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8F5796A-1E96-46DE-8B46-B46140D65A07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC79C1CD-FC2D-4667-A92E-8C87ECE04128",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CC7BDB-8C89-43AB-A514-8FC23092DE4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CFE777F-AC93-4598-A406-C437BB1FFCE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1354FE59-7DB1-4CFE-9149-40EA1CE7B000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C96219-7521-4F11-A222-9BCAB0B9B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6B51E6-ABEF-4E22-B0D0-692D76784B95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA122273-0B84-4CE6-AAF6-F89E1F986C33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3500xl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9229CAAE-1582-43DE-B727-881D0E3ABB9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84DD0996-8EF3-4845-8171-3053A4505213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "838B730D-D40C-4CBA-ABCE-BD4F4478D75F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04831AE8-B21E-4674-AD14-9E98AF50D250",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8348B895-7B3F-40CB-8843-02DBD28FC6F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27A63C6-255D-449F-B00B-4EB4060ED7E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16867F98-C635-4507-B5A9-BD19181B1E67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8473D554-26FD-4D38-92FC-EE3EE2F3D30A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3645D147-C584-48AD-9FFD-7D7401342555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F131955B-CDE7-48BC-9F64-E56BC90F2695",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F202892E-2E58-4D77-B983-38AFA51CDBC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BE25114-ABBC-47A0-9C20-E8D40D721313",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FADD5F49-2817-40EC-861C-C922825708BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E628F9C4-98C6-4A95-AF81-F1E6A56E8648",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFF899C-1EB3-46D8-9003-EA36A68C90B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6463491-F63E-44CB-A1D4-C029BE7D3D3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8668D34-096B-4FC3-B9B1-0ECFD6265778",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F918F12-DC72-45B0-B776-3F744F12F3D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD2CF99-7556-427B-BCE5-980BBADC4294",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "793FC8D9-A500-4D21-858F-97CE380C3774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C0C970-2EB3-489A-AFA5-3066B78D2A32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA10A45-3421-48A0-82D7-1605641E0AAC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853."
    },
    {
      "lang": "es",
      "value": "El servidor HTTP en Cisco IOS en switches Catalyst no trata correctamente los eventos socket TCP, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) a trav\u00e9s de paquetes hechos a mano en el puerto TCP (1) 80 o (2) 443, tambi\u00e9n conocido como Bug ID CSCuc53853."
    }
  ],
  "id": "CVE-2013-1100",
  "lastModified": "2024-11-21T01:48:54.600",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 5.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-13T23:55:01.117",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-08-06 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
Impacted products
Vendor Product Version
cisco catos 2.1\(1\)
cisco catos 2.1\(2\)
cisco catos 2.1\(3\)
cisco catos 2.1\(4\)
cisco catos 2.1\(5\)
cisco catos 2.1\(6\)
cisco catos 2.1\(7\)
cisco catos 2.1\(8\)
cisco catos 2.1\(9\)
cisco catos 2.1\(10\)
cisco catos 2.1\(11\)
cisco catos 2.1\(12\)
cisco catos 2.2\(1\)
cisco catos 2.2\(2\)
cisco catos 2.3\(1\)
cisco catos 2.4\(1\)
cisco catos 2.4\(2\)
cisco catos 2.4\(3\)
cisco catos 2.4\(4\)
cisco catos 2.4\(5\)
cisco catos 2.4\(5a\)
cisco catos 3.0\(7\)
cisco catos 3.1\(1\)
cisco catos 3.1\(2\)
cisco catos 3.1\(2a\)
cisco catos 3.2\(1\)
cisco catos 3.2\(1b\)
cisco catos 3.2\(2\)
cisco catos 3.2\(3\)
cisco catos 3.2\(4\)
cisco catos 3.2\(5\)
cisco catos 3.2\(6\)
cisco catos 3.2\(7\)
cisco catos 3.2\(8\)gdr
cisco catos 4.1\(1\)
cisco catos 4.1\(2\)
cisco catos 4.1\(3\)
cisco catos 4.2\(1\)
cisco catos 4.2\(2\)
cisco catos 4.3\(1a\)
cisco catos 4.4\(1\)
cisco catos 4.5\(1\)
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(6a\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 4.5\(10\)
cisco catos 4.5\(11\)
cisco catos 4.5\(12\)
cisco catos 4.5\(12a\)
cisco catos 4.5\(13\)
cisco catos 4.5\(13a\)
cisco catos 4.5\(14\)
cisco catos 5.1\(1\)
cisco catos 5.1\(1\)csx
cisco catos 5.1\(1a\)
cisco catos 5.1\(1a\)csx
cisco catos 5.1\(2a\)
cisco catos 5.1\(2b\)
cisco catos 5.2\(1\)
cisco catos 5.2\(1\)csx
cisco catos 5.2\(2\)
cisco catos 5.2\(2\)csx
cisco catos 5.2\(3\)
cisco catos 5.2\(3\)csx
cisco catos 5.2\(3a\)csx
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.2\(7a\)
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.3\(6a\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(1\)deferred
cisco catos 5.4\(2\)
cisco catos 5.4\(2a\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.4\(4a\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(1a\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(5\)
cisco catos 5.5\(6\)
cisco catos 5.5\(6a\)
cisco catos 5.5\(7\)
cisco catos 5.5\(7a\)
cisco catos 5.5\(8\)
cisco catos 5.5\(8a\)
cisco catos 5.5\(8a\)cv
cisco catos 5.5\(9\)
cisco catos 5.5\(10\)
cisco catos 5.5\(10a\)
cisco catos 5.5\(11\)
cisco catos 5.5\(11a\)
cisco catos 5.5\(12\)
cisco catos 5.5\(12a\)
cisco catos 5.5\(13\)
cisco catos 5.5\(13.5\)
cisco catos 5.5\(13a\)
cisco catos 5.5\(14\)
cisco catos 5.5\(15\)
cisco catos 5.5\(16\)
cisco catos 5.5\(16.2\)
cisco catos 5.5\(17\)
cisco catos 5.5\(18\)
cisco catos 5.5\(19\)
cisco catos 6.1
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(1d\)
cisco catos 6.1\(1e\)
cisco catos 6.1\(2\)
cisco catos 6.1\(2a\)
cisco catos 6.1\(3\)
cisco catos 6.1\(3a\)
cisco catos 6.1\(4\)
cisco catos 6.1\(4b\)
cisco catos 6.2\(1\)
cisco catos 6.2\(1a\)
cisco catos 6.2\(2\)
cisco catos 6.2\(2a\)
cisco catos 6.2\(3\)
cisco catos 6.2\(3a\)
cisco catos 6.3\(1\)
cisco catos 6.3\(1a\)
cisco catos 6.3\(2\)
cisco catos 6.3\(2a\)
cisco catos 6.3\(3\)
cisco catos 6.3\(3\)x
cisco catos 6.3\(3\)x1
cisco catos 6.3\(3a\)
cisco catos 6.3\(4\)
cisco catos 6.3\(4a\)
cisco catos 6.3\(5\)
cisco catos 6.3\(5.10\)
cisco catos 6.3\(6\)
cisco catos 6.3\(7\)
cisco catos 6.3\(8\)
cisco catos 6.3\(8.3\)
cisco catos 6.3\(9\)
cisco catos 6.3\(10\)
cisco catos 6.4\(1\)
cisco catos 6.4\(2\)
cisco catos 6.4\(3\)
cisco catos 6.4\(4a\)
cisco catos 6.4\(5\)
cisco catos 6.4\(6\)
cisco catos 6.4\(7\)
cisco catos 6.4\(8\)
cisco catos 7.1\(1\)
cisco catos 7.1\(1a\)
cisco catos 7.1\(2\)
cisco catos 7.1\(2a\)
cisco catos 7.2\(0.65\)
cisco catos 7.2\(1\)
cisco catos 7.2\(2\)
cisco catos 7.3
cisco catos 7.3\(1\)
cisco catos 7.3\(2\)
cisco catos 7.4
cisco catos 7.4\(0.2\)clr
cisco catos 7.4\(0.63\)
cisco catos 7.4\(1\)
cisco catos 7.4\(2\)
cisco catos 7.4\(3\)
cisco catos 7.5
cisco catos 7.5\(1\)
cisco catos 7.6
cisco catos 7.6\(1\)
cisco catos 7.6\(2\)
cisco catos 7.6\(3\)
cisco catos 7.6\(4\)
cisco catos 7.6\(5\)
cisco catos 8.1
cisco catos 8.1\(2\)
cisco catos 8.1\(3\)
cisco catos 8.2
cisco catos 8.2\(1\)
cisco catos 8.3\(1\)glx
cisco catos 8.3glx
cisco catalyst_2901 *
cisco catalyst_2902 *
cisco catalyst_2926 *
cisco catalyst_2926f *
cisco catalyst_2926gl *
cisco catalyst_2926gs *
cisco catalyst_2926t *
cisco catalyst_2948 *
cisco catalyst_2948-ge-tx *
cisco catalyst_2948g-l3 *
cisco catalyst_2980g *
cisco catalyst_2980g-a *
cisco catalyst_4000 *
cisco catalyst_4500 *
cisco catalyst_4503 *
cisco catalyst_4506 *
cisco catalyst_4507r *
cisco catalyst_4510r *
cisco catalyst_4912g *
cisco catalyst_5000 *
cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6000_ws-x6380-nam 2.1\(2\)
cisco catalyst_6000_ws-x6380-nam 3.1\(1a\)
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(4b\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 4.5\(10\)
cisco catos 4.5\(11\)
cisco catos 4.5\(12\)
cisco catos 4.5\(13a\)
cisco catos 4.5.10
cisco catos 5.1
cisco catos 5.1\(1\)
cisco catos 5.1\(1a\)
cisco catos 5.1\(2a\)
cisco catos 5.2
cisco catos 5.2\(1\)
cisco catos 5.2\(1a\)
cisco catos 5.2\(2\)
cisco catos 5.2\(3\)
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.3\(1\)csx
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(2\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(5\)
cisco catos 5.5\(6\)
cisco catos 5.5\(7\)
cisco catos 5.5\(13\)
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(2\)
cisco catos 6.1\(2.13\)
cisco catos 6.1\(3\)
cisco catos 6.2\(0.110\)
cisco catos 6.2\(0.111\)
cisco catos 6.3\(0.7\)pan
cisco catos 6.3\(4\)
cisco catos 6.3\(5\)
cisco catos 7.1
cisco catos 7.1\(2\)
cisco catos 7.5\(1\)
cisco catos 7.6\(1\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "185CC3F3-624B-4372-80EC-D8B4BC00384A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AF9A337F-7318-4163-9B6F-9ED7783CF94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A66B1FC1-F9EA-403D-A63C-E1D7AC108346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "32B13D84-10A7-44C5-B771-B9F237954B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA1D807-2C93-4C94-9CA2-D4875FB0DFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "381D0006-EE25-4B36-B9E4-65C41E7EFBAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B68ECE9E-6657-46E4-B427-C321289CF78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D9658139-AC5C-4D4C-B8E2-055DD70EDFF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "434383D6-7DE3-4A3E-8B9E-4F7F79A66807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E40FC4F6-200D-4150-9353-CA0CD1FF8F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D48351F4-51C7-4BE7-B91A-3E2FAD5A2C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.1\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5D12B329-490F-4084-8C12-3EE1394EE6E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8499827B-94C6-4259-BA90-8A5331AF0CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "36C122D0-D434-4AD4-BD57-E236BA89B85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E02B8D53-4193-4163-BF22-5534CC73ABB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1884794C-360E-4C03-ABAC-EA0007F44ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F84BC6D0-B18F-4A6F-AF51-6FA4CC83DE88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CA89EF90-0DAA-4D5E-9881-6C3A000A2ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E1ED7AAA-6978-4438-B896-F6182882CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.4\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5049D68-0729-40CF-827F-E3F59EE9214A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:2.4\\(5a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D93FEAFC-0D2E-46A9-BFD9-5C636D8AC61C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B604D3F1-98B9-487E-8E45-5BAC514689F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7B86FA-85A8-44D2-A12C-85312B765A6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "36962C89-B7F7-4C47-B9FF-5E23FDBCBB51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AC554CE9-63AA-4BC9-86F8-F3D5968733CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0077517D-E7E3-4A41-87C7-4DECECC44196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44D6DEB-84F8-4DA7-82BE-E5839BA5799C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E28F17F-12BF-48E3-B552-868F8A36B44A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "56124CD6-9802-4663-AB37-D986CB8023C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D7161615-2958-4F0A-907D-4A300D0C00C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C1104B88-1AA1-4164-B12D-970A6D0F531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6B5B3D72-7248-4518-8E3A-463AF552493E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "24F6CF22-D4B8-4857-99F8-7D1329CA33D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:3.2\\(8\\)gdr:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE024D9D-6B5B-4F50-84A3-1C2DACD924EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "92FFF1BF-4252-4183-BF0A-64074379AF09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4395AE-BAD2-4498-9A16-525CA4944001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09735A07-0FDD-4235-BCA6-377D5882F114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EE58DBF3-2ECB-4B8E-A08A-D76C3ECC09D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8500DBD9-61EC-4C9B-8F1E-ED10CBD2F804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.3\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "157FBE0B-F0BD-4E94-9C3D-349DD65F8310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAC49D-3B1F-4264-A1FE-37D55525122D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AB1738-A733-4227-B389-650FD7559D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "21C26AFA-1147-4888-AB70-E751349A29DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "699AF98D-F7F6-4FDE-9CEB-F63E5BCD8EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73A63535-F3C1-42C8-98EA-355F08AA66F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5404C55E-F7F4-4C83-87BE-02B93F76DC4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B5397DA-73CF-412B-A797-E6DEEC395FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B53B40D-E949-4811-A483-207F69BB35D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4E5CD6-16CE-41B0-9203-88F10A43247E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6955CCC-F43D-44D4-8714-0FA766C10C6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "23C82260-D8F9-48DE-AF84-B9B65BB9E277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08E971E-5FF1-48F7-8A68-FB1BB80908BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA3BD8A-FB4A-47C6-B7AB-802393DCA19C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D16366-422C-4291-A0F1-050AD80E8A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8D3189-2552-43B0-89E7-DFDB4A152A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\)deferred:*:*:*:*:*:*:*",
              "matchCriteriaId": "528940FF-E621-43B8-B562-D9B51231E1FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FA107149-E36F-4D9E-A0C5-8BAA661F18C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB2FF0C-B5F1-4FDF-B57B-7A7114E09DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7146FDF-3644-469D-8AA1-6AD19BFB5A06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6443D518-066C-46E4-90EA-94BF860741A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DB127898-E068-4696-A72D-5EDE1730E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1255E56C-2DEB-4B86-97A7-7CF6316A2C21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(8a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBFE844-7084-4F81-BC5B-42FED826AD12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(8a\\)cv:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FC0A1A-4A1F-4B38-86BA-3DADDB1D6BAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "753AC7F2-83B7-4288-926B-73774A126D1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1C6B11-4AE9-459B-870A-4845DA43ADC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(10a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45C18C9D-89F3-43BD-A3A8-EA8EF5BC6E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3F11B940-0EA7-4ABE-AA08-29646083E077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(11a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABEF59A8-3DAD-4DAE-80BF-9AED862B734D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "46B1EA66-327F-4FB9-A316-2C29B52AA33A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(12a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F854B7F7-9EDE-4452-85DC-01686BC58D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "717511D5-C05C-4D78-A76D-62E196E1FA1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF90D0A9-302D-4C66-B145-1EAC5EEBFC3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9AD4C82A-CDB7-403E-A6B8-7AFF28D2B341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "014BA0A4-F21F-4226-A3F9-50C95C2D1B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9524A795-3462-4D7B-AEA2-318EE40743E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(16.2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1DDD57B8-9123-4F59-8449-F7E404C2E081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9AB54D04-F672-4009-B9D5-FA111D16996C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(18\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDA2CA5-0DC9-4B33-B3FD-67867D6360DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "926FC1F1-C2D1-439C-9A43-B38399A1C363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDFB025-A93A-441C-84B6-EBB0902A5559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1e\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0F9CA24-9D6E-4408-AB1B-55DA4D63F871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CB27CF6D-0CCC-43C6-A19D-8BB5EC63AFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A4460-1B54-45D6-BE01-28BD52E1DC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E88E2AD3-68B4-4473-8393-8E792F2539D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(4b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9160267C-8FDB-41BB-96C0-2EAEB75BA102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7870CC-BAB2-4BC7-A35B-6629BD325D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7A98413C-3659-4959-B4C6-7787D0D15878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9626715B-2878-41CF-9CCF-84553230EB55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7512F24B-D150-4A31-807A-37B6DCAEAE4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1345465E-2B83-40FE-BC6B-536E0A2260D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8D5183C6-CBD7-4FA0-A6FA-8B35E87E59BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A614780A-D5B8-4368-9255-770C52EF1A2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1C3669F2-4892-4936-8A7E-59D640CEBEA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "30ADFF58-A65F-42F6-97BD-17E491302AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B243E03B-3A82-40D5-8B47-AED222CF45DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E7DF31-2345-4139-BE3D-94128E14F84E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3\\)x:*:*:*:*:*:*:*",
              "matchCriteriaId": "B60504C4-09F6-4D5C-AF5E-58446C6FA49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3\\)x1:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A4E69C-5E3B-4014-9382-E1FA72C31C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEF50D9-DE68-4FD0-94F8-45EF319A0332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B1A05FF1-D9AF-4752-9E4A-496DAF78D4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD37D98-2F73-4CC8-9FB3-5FCC7AA4EB31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F64FB9-F6E5-4A96-89FA-23E0531E7FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85342953-6AC3-42C3-B5BD-849FD40675F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "03C856BF-4112-454F-BBE3-AFC195F0BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(8.3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4855D79B-7AC5-4E61-A9B1-1A770C1F21B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68C6298-F045-4573-ACCD-1A82E09D72E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE2BF70-A2B4-44A8-820E-4B95D458307F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "980DC7C0-0200-4C4B-8D14-09EB151B09B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "432A925A-1922-4562-841B-65180917D22D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E444F7F2-5526-45C0-AD38-E8A41023B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B3EE2A06-BA13-4F28-A00B-057DDA2B2CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE99942-0989-47F9-B5AD-FBF4CE4216B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D798B64D-FE4A-4129-8D5A-7C123F5DFC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.4\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "30F7A129-D4EA-4F66-B6A4-147AAB3E624C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DE867B59-439F-4620-A785-E16F2C6DBC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF0CFFD-7889-4B33-AFCD-E3EA978214D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EF7E63-17F6-4D92-AAB0-205BC44940DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.2\\(0.65\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94D3F3AF-C844-4445-88E8-9608653B83C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A64DE87-64E6-4A2C-A932-D5ADBAE9A09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FF76E1E2-3EE9-4560-B138-06347ECA3B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EE322AC8-E45F-4C43-BD6A-2FA883AD33C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0462C72E-7110-48FC-BC88-FF8A5663C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7B5E1E-5698-4F69-AB53-C9F6339758C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4\\(0.2\\)clr:*:*:*:*:*:*:*",
              "matchCriteriaId": "F494A6B7-75D4-4A04-889E-7269098AF23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4\\(0.63\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E79A55B3-65CD-40D7-9215-BC924C519512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEB96B9-6F4C-4C5D-BF6F-BE65C3A96C9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7D45D090-EFAA-4D2F-BE05-1726E05B12C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43A64E8E-A8ED-414F-BC61-846AD5D582B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A01B4160-AC81-4C2D-B34A-C46EC2C610E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D726FE1E-26C9-41F2-AF59-8F8248449DE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DED72B-DBB7-4E51-AD6D-75EE407A3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BE121926-3978-4220-AC94-30A3E4BC2BFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "760418C3-E160-4468-A47A-7632245EDD84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28CA144F-341E-4F88-8D67-103F8619B742",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CCED76E-89CA-46E3-A285-2FB907780A66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8AFA7E37-DB5D-4E4C-B48E-37DF120D5DE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "786657C5-9EA5-45D0-B2F8-01AB599F4954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "75165FB6-B193-4DC9-A2FF-20F553111A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5EAA2D25-6F7C-4EAD-B2BC-B17B21C62A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.3\\(1\\)glx:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0D1A2C-EC6F-4725-B305-42CBA32C1682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.3glx:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95D74BA-04CC-46AB-9F7A-BFF1CE165778",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4D6201-495A-4EEC-876F-09B58C1D700F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D105C909-39B4-4B35-9D6E-3BC78491759F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
              "matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\""
    },
    {
      "lang": "es",
      "value": "Cisco CatOS anteriores a 5.5(20) a 8.x anteriores a 8.2(2) y 8.3(3) GLX, usados en conmutadores Catalyst, permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del sistema y reinicio) enviando paqu\u00e9tes no v\u00e1lidos en lugar de la porci\u00f3n final ACK del apret\u00f3n de manos (handshake) en tres pasos a los servicios \r\n(1) Telnet, (2) HTTP, o (3) SSH. Tambi\u00e9n conocida como  aka \"ataque de DoS TCP-ACK \"."
    }
  ],
  "id": "CVE-2004-0551",
  "lastModified": "2024-11-20T23:48:50.473",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-08-06T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/245190"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/245190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-03 02:00
Modified
2024-11-21 02:23
Severity ?
Summary
The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1sg:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BD18D1-D526-478D-9F2C-8C9FEB3C32D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4503-e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B082823E-5514-495A-8D9B-40F361D9EDE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4506-e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBE8CEE-81CD-426C-8F28-61A41CFE8139",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4507r\\+e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A3C2A6-5162-46DC-AE82-EC0061D55A51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4507r-e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2183467-5CB5-46EE-92CC-85A2EE92E5DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4510r\\+e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72F8E12-CB16-4C85-8F2E-0B799CC9E487",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4510r-e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E08577-0546-450C-BE1D-DF1A7638D419",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SNMP en Cisco IOS 15.1(2)SG4 en los dispositivos Catalyst 4500, cuando Virtual Switching System (VSS) de switch \u00fanico est\u00e1 configurado, permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) mediante la realizaci\u00f3n de sondeos SNMP, tambi\u00e9n conocido como Bug ID CSCuq04574."
    }
  ],
  "id": "CVE-2015-0687",
  "lastModified": "2024-11-21T02:23:32.313",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-03T02:00:25.910",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id/1032022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1032022"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}