Search criteria

9 vulnerabilities found for esw2-550x48dc_firmware by cisco

FKIE_CVE-2019-1892

Vulnerability from fkie_nvd - Published: 2019-07-06 02:15 - Updated: 2024-11-21 04:37
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
Impacted products
Vendor Product Version
cisco sf200-24_firmware *
cisco sf200-24 -
cisco sf200-24p_firmware *
cisco sf200-24p -
cisco sf200-48_firmware *
cisco sf200-48 -
cisco sf200-48p_firmware *
cisco sf200-48p -
cisco sg200-18_firmware *
cisco sg200-18 -
cisco sg200-26_firmware *
cisco sg200-26 -
cisco sg200-26p_firmware *
cisco sg200-26p -
cisco sg200-50_firmware *
cisco sg200-50 -
cisco sg200-50p_firmware *
cisco sg200-50p -
cisco sg300-10_firmware *
cisco sg300-10 -
cisco sg300-10mp_firmware *
cisco sg300-10mp -
cisco sg300-10mpp_firmware *
cisco sg300-10mpp -
cisco sg300-10sfp_firmware *
cisco sg300-10sfp -
cisco sg300-10p_firmware *
cisco sg300-10p -
cisco sg300-10pp_firmware *
cisco sg300-10pp -
cisco sg300-20_firmware *
cisco sg300-20 -
cisco sg300-28_firmware *
cisco sg300-28 -
cisco sg300-28p_firmware *
cisco sg300-28p -
cisco sg300-28pp_firmware *
cisco sg300-28pp -
cisco sg300-28mp_firmware *
cisco sg300-28mp -
cisco sg300-28sfp_firmware *
cisco sg300-28sfp -
cisco sg300-52_firmware *
cisco sg300-52 -
cisco sg300-52p_firmware *
cisco sg300-52p -
cisco sg300-52mp_firmware *
cisco sg300-52mp -
cisco sf300-08_firmware *
cisco sf300-08 -
cisco sf302-08_firmware *
cisco sf302-08 -
cisco sf302-08mp_firmware *
cisco sf302-08mp -
cisco sf302-08p_firmware *
cisco sf302-08p -
cisco sf302-08pp_firmware *
cisco sf302-08pp -
cisco sf302-08mpp_firmware *
cisco sf302-08mpp -
cisco sf300-24_firmware *
cisco sf300-24 -
cisco sf300-24p_firmware *
cisco sf300-24p -
cisco sf300-24mp_firmware *
cisco sf300-24mp -
cisco sf300-24pp_firmware *
cisco sf300-24pp -
cisco sf300-48_firmware *
cisco sf300-48 -
cisco sf300-48p_firmware *
cisco sf300-48p -
cisco sf300-48pp_firmware *
cisco sf300-48pp -
cisco sf500-24_firmware *
cisco sf500-24 -
cisco sf500-24p_firmware *
cisco sf500-24p -
cisco sf500-24mp_firmware *
cisco sf500-24mp -
cisco sf500-48_firmware *
cisco sf500-48 -
cisco sf500-48p_firmware *
cisco sf500-48p -
cisco sf500-48mp_firmware *
cisco sf500-48mp -
cisco sg500-28_firmware *
cisco sg500-28 -
cisco sg500-28p_firmware *
cisco sg500-28p -
cisco sg500-28mpp_firmware *
cisco sg500-28mpp -
cisco sg500-52_firmware *
cisco sg500-52 -
cisco sg500-52p_firmware *
cisco sg500-52p -
cisco sg500-52mp_firmware *
cisco sg500-52mp -
cisco sg500x-24_firmware *
cisco sg500x-24 -
cisco sg500x24mpp_firmware *
cisco sg500x24mpp -
cisco sg500x-48_firmware *
cisco sg500x-48 -
cisco sg500x-48p_firmware *
cisco sg500x-48p -
cisco sg500x-48mp_firmware *
cisco sg500x-48mp -
cisco sg500xg8f8t_firmware *
cisco sg500xg8f8t -
cisco esw2-350g52dc_firmware *
cisco esw2-350g52dc -
cisco esw2-550x48dc_firmware *
cisco esw2-550x48dc -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el procesador de paquetes de entrada de Secure Sockets Layer (SSL) de los Switches Administrados de las series 200, 300 y 500 de Cisco Small Business, podr\u00eda permitir a un atacante remoto no autenticado causar una corrupci\u00f3n de memoria de un dispositivo afectado. La vulnerabilidad es debido a la comprobaci\u00f3n inapropiada de los paquetes HTTPS. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete HTTPS malformado hacia la interfaz web de administraci\u00f3n del dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2019-1892",
  "lastModified": "2024-11-21T04:37:37.757",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-06T02:15:11.293",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2019-1891

Vulnerability from fkie_nvd - Published: 2019-07-06 02:15 - Updated: 2024-11-21 04:37
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
Impacted products
Vendor Product Version
cisco sf200-24_firmware *
cisco sf200-24 -
cisco sf200-24p_firmware *
cisco sf200-24p -
cisco sf200-48_firmware *
cisco sf200-48 -
cisco sf200-48p_firmware *
cisco sf200-48p -
cisco sg200-18_firmware *
cisco sg200-18 -
cisco sg200-26_firmware *
cisco sg200-26 -
cisco sg200-26p_firmware *
cisco sg200-26p -
cisco sg200-50_firmware *
cisco sg200-50 -
cisco sg200-50p_firmware *
cisco sg200-50p -
cisco sg300-10_firmware *
cisco sg300-10 -
cisco sg300-10mp_firmware *
cisco sg300-10mp -
cisco sg300-10mpp_firmware *
cisco sg300-10mpp -
cisco sg300-10sfp_firmware *
cisco sg300-10sfp -
cisco sg300-10p_firmware *
cisco sg300-10p -
cisco sg300-10pp_firmware *
cisco sg300-10pp -
cisco sg300-20_firmware *
cisco sg300-20 -
cisco sg300-28_firmware *
cisco sg300-28 -
cisco sg300-28p_firmware *
cisco sg300-28p -
cisco sg300-28pp_firmware *
cisco sg300-28pp -
cisco sg300-28mp_firmware *
cisco sg300-28mp -
cisco sg300-28sfp_firmware *
cisco sg300-28sfp -
cisco sg300-52_firmware *
cisco sg300-52 -
cisco sg300-52p_firmware *
cisco sg300-52p -
cisco sg300-52mp_firmware *
cisco sg300-52mp -
cisco sf300-08_firmware *
cisco sf300-08 -
cisco sf302-08_firmware *
cisco sf302-08 -
cisco sf302-08mp_firmware *
cisco sf302-08mp -
cisco sf302-08p_firmware *
cisco sf302-08p -
cisco sf302-08pp_firmware *
cisco sf302-08pp -
cisco sf302-08mpp_firmware *
cisco sf302-08mpp -
cisco sf300-24_firmware *
cisco sf300-24 -
cisco sf300-24p_firmware *
cisco sf300-24p -
cisco sf300-24mp_firmware *
cisco sf300-24mp -
cisco sf300-24pp_firmware *
cisco sf300-24pp -
cisco sf300-48_firmware *
cisco sf300-48 -
cisco sf300-48p_firmware *
cisco sf300-48p -
cisco sf300-48pp_firmware *
cisco sf300-48pp -
cisco sf500-24_firmware *
cisco sf500-24 -
cisco sf500-24p_firmware *
cisco sf500-24p -
cisco sf500-24mp_firmware *
cisco sf500-24mp -
cisco sf500-48_firmware *
cisco sf500-48 -
cisco sf500-48p_firmware *
cisco sf500-48p -
cisco sf500-48mp_firmware *
cisco sf500-48mp -
cisco sg500-28_firmware *
cisco sg500-28 -
cisco sg500-28p_firmware *
cisco sg500-28p -
cisco sg500-28mpp_firmware *
cisco sg500-28mpp -
cisco sg500-52_firmware *
cisco sg500-52 -
cisco sg500-52p_firmware *
cisco sg500-52p -
cisco sg500-52mp_firmware *
cisco sg500-52mp -
cisco sg500x-24_firmware *
cisco sg500x-24 -
cisco sg500x24mpp_firmware *
cisco sg500x24mpp -
cisco sg500x-48_firmware *
cisco sg500x-48 -
cisco sg500x-48p_firmware *
cisco sg500x-48p -
cisco sg500x-48mp_firmware *
cisco sg500x-48mp -
cisco sg500xg8f8t_firmware *
cisco sg500xg8f8t -
cisco esw2-350g52dc_firmware *
cisco esw2-350g52dc -
cisco esw2-550x48dc_firmware *
cisco esw2-550x48dc -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz web de los Switches Administrados de las series 200, 300 y 500 de Cisco Small Business, podr\u00eda permitir a un atacante remoto no identificado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a la comprobaci\u00f3n inapropiada de las peticiones enviadas a la interfaz web. Un atacante podr\u00eda aprovechar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n maliciosa a la interfaz web de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n de DoS."
    }
  ],
  "id": "CVE-2019-1891",
  "lastModified": "2024-11-21T04:37:37.573",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-06T02:15:11.183",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2019-1806

Vulnerability from fkie_nvd - Published: 2019-05-15 22:29 - Updated: 2024-11-21 04:37
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
Impacted products
Vendor Product Version
cisco sf200-24_firmware *
cisco sf200-24 -
cisco sf200-24p_firmware *
cisco sf200-24p -
cisco sf200-48_firmware *
cisco sf200-48 -
cisco sf200-48p_firmware *
cisco sf200-48p -
cisco sg200-18_firmware *
cisco sg200-18 -
cisco sg200-26_firmware *
cisco sg200-26 -
cisco sg200-26p_firmware *
cisco sg200-26p -
cisco sg200-50_firmware *
cisco sg200-50 -
cisco sg200-50p_firmware *
cisco sg200-50p -
cisco sg300-10_firmware *
cisco sg300-10 -
cisco sg300-10mp_firmware *
cisco sg300-10mp -
cisco sg300-10mpp_firmware *
cisco sg300-10mpp -
cisco sg300-10sfp_firmware *
cisco sg300-10sfp -
cisco sg300-10p_firmware *
cisco sg300-10p -
cisco sg300-10pp_firmware *
cisco sg300-10pp -
cisco sg300-20_firmware *
cisco sg300-20 -
cisco sg300-28_firmware *
cisco sg300-28 -
cisco sg300-28p_firmware *
cisco sg300-28p -
cisco sg300-28pp_firmware *
cisco sg300-28pp -
cisco sg300-28mp_firmware *
cisco sg300-28mp -
cisco sg300-28sfp_firmware *
cisco sg300-28sfp -
cisco sg300-52_firmware *
cisco sg300-52 -
cisco sg300-52p_firmware *
cisco sg300-52p -
cisco sg300-52mp_firmware *
cisco sg300-52mp -
cisco sf300-08_firmware *
cisco sf300-08 -
cisco sf302-08_firmware *
cisco sf302-08 -
cisco sf302-08mp_firmware *
cisco sf302-08mp -
cisco sf302-08p_firmware *
cisco sf302-08p -
cisco sf302-08pp_firmware *
cisco sf302-08pp -
cisco sf302-08mpp_firmware *
cisco sf302-08mpp -
cisco sf300-24_firmware *
cisco sf300-24 -
cisco sf300-24p_firmware *
cisco sf300-24p -
cisco sf300-24mp_firmware *
cisco sf300-24mp -
cisco sf300-24pp_firmware *
cisco sf300-24pp -
cisco sf300-48_firmware *
cisco sf300-48 -
cisco sf300-48p_firmware *
cisco sf300-48p -
cisco sf300-48pp_firmware *
cisco sf300-48pp -
cisco sf500-24_firmware *
cisco sf500-24 -
cisco sf500-24p_firmware *
cisco sf500-24p -
cisco sf500-24mp_firmware *
cisco sf500-24mp -
cisco sf500-48_firmware *
cisco sf500-48 -
cisco sf500-48p_firmware *
cisco sf500-48p -
cisco sf500-48mp_firmware *
cisco sf500-48mp -
cisco sg500-28_firmware *
cisco sg500-28 -
cisco sg500-28p_firmware *
cisco sg500-28p -
cisco sg500-28mpp_firmware *
cisco sg500-28mpp -
cisco sg500-52_firmware *
cisco sg500-52 -
cisco sg500-52p_firmware *
cisco sg500-52p -
cisco sg500-52mp_firmware *
cisco sg500-52mp -
cisco sg500x-24_firmware *
cisco sg500x-24 -
cisco sg500x-24p_firmware *
cisco sg500x-24p -
cisco sg500x24mpp_firmware *
cisco sg500x24mpp -
cisco sg500x-48_firmware *
cisco sg500x-48 -
cisco sg500x-48p_firmware *
cisco sg500x-48p -
cisco sg500x-48mp_firmware *
cisco sg500x-48mp -
cisco sg500xg8f8t_firmware *
cisco sg500xg8f8t -
cisco esw2-350g52dc_firmware *
cisco esw2-350g52dc -
cisco esw2-550x48dc_firmware *
cisco esw2-550x48dc -
cisco sg250x-24_firmware *
cisco sg250x-24 -
cisco sg250x-24p_firmware *
cisco sg250x-24p -
cisco sg250x-48_firmware *
cisco sg250x-48 -
cisco sg250x-48p_firmware *
cisco sg250x-48p -
cisco sg250-08_firmware *
cisco sg250-08 -
cisco sg250-08hp_firmware *
cisco sg250-08hp -
cisco sg250-10p_firmware *
cisco sg250-10p -
cisco sg250-18_firmware *
cisco sg250-18 -
cisco sg250-26_firmware *
cisco sg250-26 -
cisco sg250-26hp_firmware *
cisco sg250-26hp -
cisco sg250-26p_firmware *
cisco sg250-26p -
cisco sg250-50_firmware *
cisco sg250-50 -
cisco sg250-50hp_firmware *
cisco sg250-50hp -
cisco sg250-50p_firmware *
cisco sg250-50p -
cisco sf250-24_firmware *
cisco sf250-24 -
cisco sf250-24p_firmware *
cisco sf250-24p -
cisco sf250-48_firmware *
cisco sf250-48 -
cisco sf250-48hp_firmware *
cisco sf250-48hp -
cisco sg350-10_firmware *
cisco sg350-10 -
cisco sg350-10p_firmware *
cisco sg350-10p -
cisco sg350-10mp_firmware *
cisco sg350-10mp -
cisco sg355-10p_firmware *
cisco sg355-10p -
cisco sg350-28_firmware *
cisco sg350-28 -
cisco sg350-28p_firmware *
cisco sg350-28p -
cisco sg350-28mp_firmware *
cisco sg350-28mp -
cisco sf350-48_firmware *
cisco sf350-48 -
cisco sf350-48p_firmware *
cisco sf350-48p -
cisco sf350-48mp_firmware *
cisco sf350-48mp -
cisco sx550x-16ft_firmware *
cisco sx550x-16ft -
cisco sx550x-24ft_firmware *
cisco sx550x-24ft -
cisco sx550x-12f_firmware *
cisco sx550x-12f -
cisco sx550x-24f_firmware *
cisco sx550x-24f -
cisco sx550x-24_firmware *
cisco sx550x-24 -
cisco sx550x-52_firmware *
cisco sx550x-52 -
cisco sg550x-24_firmware *
cisco sg550x-24 -
cisco sg550x-24p_firmware *
cisco sg550x-24p -
cisco sg550x-24mp_firmware *
cisco sg550x-24mp -
cisco sg550x-24mpp_firmware *
cisco sg550x-24mpp -
cisco sg550x-48_firmware *
cisco sg550x-48 -
cisco sg550x-48p_firmware *
cisco sg550x-48p -
cisco sg550x-48mp_firmware *
cisco sg550x-48mp -
cisco sf550x-24_firmware *
cisco sf550x-24 -
cisco sf550x-24p_firmware *
cisco sf550x-24p -
cisco sf550x-24mp_firmware *
cisco sf550x-24mp -
cisco sf550x-48_firmware *
cisco sf550x-48 -
cisco sf550x-48p_firmware *
cisco sf550x-48p -
cisco sf550x-48mp_firmware *
cisco sf550x-48mp -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "842B9A79-D574-41EB-8027-9038FC0E3F64",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12D57C7-8A54-4124-8E1E-37F03A5C985C",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AD939F-CD46-4127-BED2-C90D9219367F",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "548424AC-7644-4FEE-88A7-24C7E7F814A1",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2203C60A-0069-4F5A-AAD7-BA99A45DC779",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF4A347-A9EC-443D-8244-9CCF18E857C3",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE45D7A-2724-45C3-A41F-9E38D37932C5",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E99E251-5F53-4968-85BC-A0EFA7891917",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09CCE38-1E2B-4BD1-96B0-535A51BD698E",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB8399A-B1AD-4201-9A85-AE332F8D46DC",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C37F67-8132-4A19-A702-7B6C60F9897E",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13DBAA04-CE95-4549-9457-4900AB3D1A8E",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4490464D-BAC7-489C-A2C1-4971AC8B7F54",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF659800-49AB-4416-B6F3-FF5F8F41C72B",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC0FB45-E376-4EFF-8866-2E42494296BB",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3623874C-7E67-40AF-A094-499E1857D048",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E417898B-0AE2-45AD-944A-9EE6D806CD8E",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23356E45-B7B2-4A32-B821-D1C53D3FD6A5",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB5362A-022F-42F8-AD49-C2557243B972",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1175B98B-DFE3-4A48-A453-80FA643EBD35",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "991DA0D7-7142-4EC1-8991-195D2F5D0B31",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC93E7A-6055-49E6-AEC7-F819113D902E",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "645781BB-E440-42F9-9369-495366447B30",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB911D6-F531-42DC-9537-B7DF20A09CE3",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C758954B-BCD6-4C06-844E-C0FB1626D024",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E6CA13-6231-4722-90DD-4495F4C10E0B",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEB673A-B39B-49DC-9CF0-D1E636068E75",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "107F975E-EEE4-4F40-BDCF-9E5F86528982",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91AF6345-7D52-4467-9864-C63F888613AF",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B2FC17-14E6-41C9-B3B2-D8791EB1379C",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28EC4789-E1D6-47A4-A92B-0F6196688159",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A9255C-6562-4DBC-A42C-D5D74FA948C5",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52978A27-0D0E-4DB8-B988-D5E6F608DC1B",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38531BE0-3233-44F9-9F91-74A479CA27C5",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB87CFE-3151-4473-A006-258325F2E079",
              "versionEndExcluding": "2.5.0.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el procesador de paquetes de entrada de Simple Network Management Protocol (SNMP)  de  Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches podr\u00eda permitir que un atacante remoto autenticado provoque la aplicaci\u00f3n SNMP de un dispositivo afectado para detener el procesamiento del tr\u00e1fico, lo que hace que la utilizaci\u00f3n de la CPU alcance el cien por ciento. Puede requerirse una intervenci\u00f3n manual antes de que un dispositivo reanude las operaciones normales. La vulnerabilidad se debe a la validaci\u00f3n inapropiada de las unidades de datos del protocolo SNMP (PDU) en los paquetes SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete SNMP malicioso a un dispositivo afectado. Un aprovechamiento exitoso podr\u00eda permitir al atacante hacer que el dispositivo deje de pasar el tr\u00e1fico, lo que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Cisco ha generado actualizaciones de firmware que abordan esta vulnerabilidad."
    }
  ],
  "id": "CVE-2019-1806",
  "lastModified": "2024-11-21T04:37:25.137",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-15T22:29:00.247",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108335"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108335"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2019-1891 (GCVE-0-2019-1891)

Vulnerability from cvelistv5 – Published: 2019-07-06 01:15 – Updated: 2024-11-19 19:03
VLAI?
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Small Business 300 Series Managed Switches Affected: unspecified , < 1.4.10.6 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:52.041Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1891",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T17:23:45.687480Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T19:03:24.144Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 Series Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.4.10.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-07-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-06T01:15:17",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190703-sbss-dos",
        "defect": [
          [
            "CSCvp43403",
            "CSCvp43417"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-07-03T16:00:00-0700",
          "ID": "CVE-2019-1891",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.4.10.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190703-sbss-dos",
          "defect": [
            [
              "CSCvp43403",
              "CSCvp43417"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1891",
    "datePublished": "2019-07-06T01:15:17.766702Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-19T19:03:24.144Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1892 (GCVE-0-2019-1892)

Vulnerability from cvelistv5 – Published: 2019-07-06 01:15 – Updated: 2024-11-19 19:03
VLAI?
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Small Business 300 Series Managed Switches Affected: unspecified , < 1.4.10.6 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:50.769Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1892",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T17:23:47.263777Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T19:03:39.713Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 Series Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.4.10.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-07-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-06T01:15:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190703-sbss-memcorrupt",
        "defect": [
          [
            "CSCvp43390"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Series Switches Memory Corruption Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-07-03T16:00:00-0700",
          "ID": "CVE-2019-1892",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Series Switches Memory Corruption Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.4.10.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190703-sbss-memcorrupt",
          "defect": [
            [
              "CSCvp43390"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1892",
    "datePublished": "2019-07-06T01:15:12.767702Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-19T19:03:39.713Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1806 (GCVE-0-2019-1806)

Vulnerability from cvelistv5 – Published: 2019-05-15 21:45 – Updated: 2024-11-21 19:26
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/108335 vdb-entryx_refsource_BID
Impacted products
Vendor Product Version
Cisco Cisco 550X Series Stackable Managed Switches Affected: unspecified , < 1.4.10.6 (custom)
Affected: unspecified , < 2.5.0.78 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
          },
          {
            "name": "108335",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108335"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1806",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:58:33.464072Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:26:01.587Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco 550X Series Stackable Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.4.10.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.78",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-16T06:06:04",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
        },
        {
          "name": "108335",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108335"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190515-sb-snmpdos",
        "defect": [
          [
            "CSCvn49346",
            "CSCvn93730"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-05-15T16:00:00-0700",
          "ID": "CVE-2019-1806",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco 550X Series Stackable Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.4.10.6"
                          },
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "2.5.0.78"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.7",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
            },
            {
              "name": "108335",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108335"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190515-sb-snmpdos",
          "defect": [
            [
              "CSCvn49346",
              "CSCvn93730"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1806",
    "datePublished": "2019-05-15T21:45:15.994826Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:26:01.587Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1891 (GCVE-0-2019-1891)

Vulnerability from nvd – Published: 2019-07-06 01:15 – Updated: 2024-11-19 19:03
VLAI?
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Small Business 300 Series Managed Switches Affected: unspecified , < 1.4.10.6 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:52.041Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1891",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T17:23:45.687480Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T19:03:24.144Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 Series Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.4.10.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-07-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-06T01:15:17",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190703-sbss-dos",
        "defect": [
          [
            "CSCvp43403",
            "CSCvp43417"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-07-03T16:00:00-0700",
          "ID": "CVE-2019-1891",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.4.10.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190703-sbss-dos",
          "defect": [
            [
              "CSCvp43403",
              "CSCvp43417"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1891",
    "datePublished": "2019-07-06T01:15:17.766702Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-19T19:03:24.144Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1892 (GCVE-0-2019-1892)

Vulnerability from nvd – Published: 2019-07-06 01:15 – Updated: 2024-11-19 19:03
VLAI?
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Small Business 300 Series Managed Switches Affected: unspecified , < 1.4.10.6 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:50.769Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1892",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T17:23:47.263777Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T19:03:39.713Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 Series Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.4.10.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-07-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-06T01:15:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190703-sbss-memcorrupt",
        "defect": [
          [
            "CSCvp43390"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Series Switches Memory Corruption Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-07-03T16:00:00-0700",
          "ID": "CVE-2019-1892",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Series Switches Memory Corruption Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.4.10.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190703-sbss-memcorrupt",
          "defect": [
            [
              "CSCvp43390"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1892",
    "datePublished": "2019-07-06T01:15:12.767702Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-19T19:03:39.713Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1806 (GCVE-0-2019-1806)

Vulnerability from nvd – Published: 2019-05-15 21:45 – Updated: 2024-11-21 19:26
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/108335 vdb-entryx_refsource_BID
Impacted products
Vendor Product Version
Cisco Cisco 550X Series Stackable Managed Switches Affected: unspecified , < 1.4.10.6 (custom)
Affected: unspecified , < 2.5.0.78 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
          },
          {
            "name": "108335",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108335"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1806",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:58:33.464072Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:26:01.587Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco 550X Series Stackable Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.4.10.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.78",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-16T06:06:04",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
        },
        {
          "name": "108335",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108335"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190515-sb-snmpdos",
        "defect": [
          [
            "CSCvn49346",
            "CSCvn93730"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-05-15T16:00:00-0700",
          "ID": "CVE-2019-1806",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco 550X Series Stackable Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.4.10.6"
                          },
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "2.5.0.78"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.7",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
            },
            {
              "name": "108335",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108335"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190515-sb-snmpdos",
          "defect": [
            [
              "CSCvn49346",
              "CSCvn93730"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1806",
    "datePublished": "2019-05-15T21:45:15.994826Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:26:01.587Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}