All the vulnerabilites related to cisco - esw2-550x48dc_firmware
cve-2019-1892
Vulnerability from cvelistv5
Published
2019-07-06 01:15
Modified
2024-11-19 19:03
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 300 Series Managed Switches |
Version: unspecified < 1.4.10.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:50.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1892", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:47.263777Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:03:39.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-06T01:15:12", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ], "source": { "advisory": "cisco-sa-20190703-sbss-memcorrupt", "defect": [ [ "CSCvp43390" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches Memory Corruption Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1892", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches Memory Corruption Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Small Business Series Switches Memory Corruption Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ] }, "source": { "advisory": "cisco-sa-20190703-sbss-memcorrupt", "defect": [ [ "CSCvp43390" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1892", "datePublished": "2019-07-06T01:15:12.767702Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:03:39.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1891
Vulnerability from cvelistv5
Published
2019-07-06 01:15
Modified
2024-11-19 19:03
Severity ?
EPSS score ?
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 300 Series Managed Switches |
Version: unspecified < 1.4.10.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1891", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:45.687480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:03:24.144Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business 300 Series Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-06T01:15:17", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ], "source": { "advisory": "cisco-sa-20190703-sbss-dos", "defect": [ [ "CSCvp43403", "CSCvp43417" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1891", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches HTTP Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business 300 Series Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Small Business Series Switches HTTP Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ] }, "source": { "advisory": "cisco-sa-20190703-sbss-dos", "defect": [ [ "CSCvp43403", "CSCvp43417" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1891", "datePublished": "2019-07-06T01:15:17.766702Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:03:24.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1806
Vulnerability from cvelistv5
Published
2019-05-15 21:45
Modified
2024-11-21 19:26
Severity ?
EPSS score ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108335 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco 550X Series Stackable Managed Switches |
Version: unspecified < 1.4.10.6 Version: unspecified < 2.5.0.78 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "name": "108335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108335" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1806", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:33.464072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:26:01.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco 550X Series Stackable Managed Switches", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.10.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.5.0.78", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-16T06:06:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "name": "108335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108335" } ], "source": { "advisory": "cisco-sa-20190515-sb-snmpdos", "defect": [ [ "CSCvn49346", "CSCvn93730" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-15T16:00:00-0700", "ID": "CVE-2019-1806", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco 550X Series Stackable Managed Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.10.6" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.5.0.78" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "name": "108335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108335" } ] }, "source": { "advisory": "cisco-sa-20190515-sb-snmpdos", "defect": [ [ "CSCvn49346", "CSCvn93730" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1806", "datePublished": "2019-05-15T21:45:15.994826Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:26:01.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-21 04:37
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz web de los Switches Administrados de las series 200, 300 y 500 de Cisco Small Business, podr\u00eda permitir a un atacante remoto no identificado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a la comprobaci\u00f3n inapropiada de las peticiones enviadas a la interfaz web. Un atacante podr\u00eda aprovechar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n maliciosa a la interfaz web de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n de DoS." } ], "id": "CVE-2019-1891", "lastModified": "2024-11-21T04:37:37.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-06T02:15:11.183", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-15 22:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "842B9A79-D574-41EB-8027-9038FC0E3F64", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12D57C7-8A54-4124-8E1E-37F03A5C985C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53AD939F-CD46-4127-BED2-C90D9219367F", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "548424AC-7644-4FEE-88A7-24C7E7F814A1", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2203C60A-0069-4F5A-AAD7-BA99A45DC779", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AF4A347-A9EC-443D-8244-9CCF18E857C3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCE45D7A-2724-45C3-A41F-9E38D37932C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E99E251-5F53-4968-85BC-A0EFA7891917", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09CCE38-1E2B-4BD1-96B0-535A51BD698E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BB8399A-B1AD-4201-9A85-AE332F8D46DC", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C37F67-8132-4A19-A702-7B6C60F9897E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13DBAA04-CE95-4549-9457-4900AB3D1A8E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4490464D-BAC7-489C-A2C1-4971AC8B7F54", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF659800-49AB-4416-B6F3-FF5F8F41C72B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAC0FB45-E376-4EFF-8866-2E42494296BB", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3623874C-7E67-40AF-A094-499E1857D048", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E417898B-0AE2-45AD-944A-9EE6D806CD8E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23356E45-B7B2-4A32-B821-D1C53D3FD6A5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDB5362A-022F-42F8-AD49-C2557243B972", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1175B98B-DFE3-4A48-A453-80FA643EBD35", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "991DA0D7-7142-4EC1-8991-195D2F5D0B31", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BC93E7A-6055-49E6-AEC7-F819113D902E", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "645781BB-E440-42F9-9369-495366447B30", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FB911D6-F531-42DC-9537-B7DF20A09CE3", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C758954B-BCD6-4C06-844E-C0FB1626D024", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57E6CA13-6231-4722-90DD-4495F4C10E0B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DEB673A-B39B-49DC-9CF0-D1E636068E75", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "107F975E-EEE4-4F40-BDCF-9E5F86528982", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91AF6345-7D52-4467-9864-C63F888613AF", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B2FC17-14E6-41C9-B3B2-D8791EB1379C", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28EC4789-E1D6-47A4-A92B-0F6196688159", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4A9255C-6562-4DBC-A42C-D5D74FA948C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52978A27-0D0E-4DB8-B988-D5E6F608DC1B", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38531BE0-3233-44F9-9F91-74A479CA27C5", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EB87CFE-3151-4473-A006-258325F2E079", "versionEndExcluding": "2.5.0.78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en el procesador de paquetes de entrada de Simple Network Management Protocol (SNMP) de Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches podr\u00eda permitir que un atacante remoto autenticado provoque la aplicaci\u00f3n SNMP de un dispositivo afectado para detener el procesamiento del tr\u00e1fico, lo que hace que la utilizaci\u00f3n de la CPU alcance el cien por ciento. Puede requerirse una intervenci\u00f3n manual antes de que un dispositivo reanude las operaciones normales. La vulnerabilidad se debe a la validaci\u00f3n inapropiada de las unidades de datos del protocolo SNMP (PDU) en los paquetes SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete SNMP malicioso a un dispositivo afectado. Un aprovechamiento exitoso podr\u00eda permitir al atacante hacer que el dispositivo deje de pasar el tr\u00e1fico, lo que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Cisco ha generado actualizaciones de firmware que abordan esta vulnerabilidad." } ], "id": "CVE-2019-1806", "lastModified": "2024-11-21T04:37:25.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-15T22:29:00.247", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108335" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-21 04:37
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C", "versionEndExcluding": "1.4.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en el procesador de paquetes de entrada de Secure Sockets Layer (SSL) de los Switches Administrados de las series 200, 300 y 500 de Cisco Small Business, podr\u00eda permitir a un atacante remoto no autenticado causar una corrupci\u00f3n de memoria de un dispositivo afectado. La vulnerabilidad es debido a la comprobaci\u00f3n inapropiada de los paquetes HTTPS. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete HTTPS malformado hacia la interfaz web de administraci\u00f3n del dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2019-1892", "lastModified": "2024-11-21T04:37:37.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-06T02:15:11.293", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }