All the vulnerabilites related to cisco - ie-4000-8s4g-e_industrial_ethernet_switch
Vulnerability from fkie_nvd
Published
2017-03-17 22:59
Modified
2024-11-21 03:26
Severity ?
Summary
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
Impacted products
Vendor Product Version
cisco ios *
cisco ios_xe *
cisco catalyst_2350-48td-s -
cisco catalyst_2350-48td-sd -
cisco catalyst_2360-48td-s -
cisco catalyst_2918-24tc-c -
cisco catalyst_2918-24tt-c -
cisco catalyst_2918-48tc-c -
cisco catalyst_2918-48tt-c -
cisco catalyst_2928-24tc-c -
cisco catalyst_2960-24-s -
cisco catalyst_2960-24lc-s -
cisco catalyst_2960-24lt-l -
cisco catalyst_2960-24pc-l -
cisco catalyst_2960-24pc-s -
cisco catalyst_2960-24tc-l -
cisco catalyst_2960-24tc-s -
cisco catalyst_2960-24tt-l -
cisco catalyst_2960-48pst-l -
cisco catalyst_2960-48pst-s -
cisco catalyst_2960-48tc-l -
cisco catalyst_2960-48tc-s -
cisco catalyst_2960-48tt-l -
cisco catalyst_2960-48tt-s -
cisco catalyst_2960-8tc-l -
cisco catalyst_2960-8tc-s -
cisco catalyst_2960-plus_24lc-l -
cisco catalyst_2960-plus_24lc-s -
cisco catalyst_2960-plus_24pc-l -
cisco catalyst_2960-plus_24pc-s -
cisco catalyst_2960-plus_24tc-l -
cisco catalyst_2960-plus_24tc-s -
cisco catalyst_2960-plus_48pst-l -
cisco catalyst_2960-plus_48pst-s -
cisco catalyst_2960-plus_48tc-l -
cisco catalyst_2960-plus_48tc-s -
cisco catalyst_2960c-12pc-l -
cisco catalyst_2960c-8pc-l -
cisco catalyst_2960c-8tc-l -
cisco catalyst_2960c-8tc-s -
cisco catalyst_2960cg-8tc-l -
cisco catalyst_2960cpd-8pt-l -
cisco catalyst_2960cpd-8tt-l -
cisco catalyst_2960cx-8pc-l -
cisco catalyst_2960cx-8tc-l -
cisco catalyst_2960g-24tc-l -
cisco catalyst_2960g-48tc-l -
cisco catalyst_2960g-8tc-l -
cisco catalyst_2960l-16ps-ll -
cisco catalyst_2960l-16ts-ll -
cisco catalyst_2960l-24ps-ll -
cisco catalyst_2960l-24ts-ll -
cisco catalyst_2960l-48ps-ll -
cisco catalyst_2960l-48ts-ll -
cisco catalyst_2960l-8ps-ll -
cisco catalyst_2960l-8ts-ll -
cisco catalyst_2960pd-8tt-l -
cisco catalyst_2960s-24pd-l -
cisco catalyst_2960s-24ps-l -
cisco catalyst_2960s-24td-l -
cisco catalyst_2960s-24ts-l -
cisco catalyst_2960s-24ts-s -
cisco catalyst_2960s-48fpd-l -
cisco catalyst_2960s-48fps-l -
cisco catalyst_2960s-48lpd-l -
cisco catalyst_2960s-48lps-l -
cisco catalyst_2960s-48td-l -
cisco catalyst_2960s-48ts-l -
cisco catalyst_2960s-48ts-s -
cisco catalyst_2960s-f24ps-l -
cisco catalyst_2960s-f24ts-l -
cisco catalyst_2960s-f24ts-s -
cisco catalyst_2960s-f48fps-l -
cisco catalyst_2960s-f48lps-l -
cisco catalyst_2960s-f48ts-l -
cisco catalyst_2960s-f48ts-s -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24pd-l -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24ps-l -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24td-l -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-24ts-l -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fpd-l -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48fps-l -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lpd-l -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48lps-l -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48td-l -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_2960xr-48ts-l -
cisco catalyst_2970g-24t -
cisco catalyst_2970g-24ts -
cisco catalyst_2975 -
cisco catalyst_3550_12g -
cisco catalyst_3550_12t -
cisco catalyst_3550_24_dc_smi -
cisco catalyst_3550_24_emi -
cisco catalyst_3550_24_fx_smi -
cisco catalyst_3550_24_pwr -
cisco catalyst_3550_24_smi -
cisco catalyst_3550_48_emi -
cisco catalyst_3550_48_smi -
cisco catalyst_3560-12pc-s -
cisco catalyst_3560-24ps -
cisco catalyst_3560-24ts -
cisco catalyst_3560-48ps -
cisco catalyst_3560-48ts -
cisco catalyst_3560-8pc -
cisco catalyst_3560c-12pc-s -
cisco catalyst_3560c-8pc-s -
cisco catalyst_3560cg-8pc-s -
cisco catalyst_3560cg-8tc-s -
cisco catalyst_3560cpd-8pt-s -
cisco catalyst_3560cx-12pc-s -
cisco catalyst_3560cx-12pd-s -
cisco catalyst_3560cx-12tc-s -
cisco catalyst_3560cx-8pc-s -
cisco catalyst_3560cx-8pt-s -
cisco catalyst_3560cx-8tc-s -
cisco catalyst_3560cx-8xpd-s -
cisco catalyst_3560e-12d-e -
cisco catalyst_3560e-12d-s -
cisco catalyst_3560e-12sd-e -
cisco catalyst_3560e-12sd-s -
cisco catalyst_3560e-24pd-e -
cisco catalyst_3560e-24pd-s -
cisco catalyst_3560e-24td-e -
cisco catalyst_3560e-24td-s -
cisco catalyst_3560e-48pd-e -
cisco catalyst_3560e-48pd-ef -
cisco catalyst_3560e-48pd-s -
cisco catalyst_3560e-48pd-sf -
cisco catalyst_3560e-48td-e -
cisco catalyst_3560e-48td-s -
cisco catalyst_3560g-24ps -
cisco catalyst_3560g-24ts -
cisco catalyst_3560g-48ps -
cisco catalyst_3560g-48ts -
cisco catalyst_3560v2-24dc -
cisco catalyst_3560v2-24ps -
cisco catalyst_3560v2-24ts -
cisco catalyst_3560v2-48ps -
cisco catalyst_3560v2-48ts -
cisco catalyst_3560x-24p-e -
cisco catalyst_3560x-24p-l -
cisco catalyst_3560x-24p-s -
cisco catalyst_3560x-24t-e -
cisco catalyst_3560x-24t-l -
cisco catalyst_3560x-24t-s -
cisco catalyst_3560x-24u-e -
cisco catalyst_3560x-24u-l -
cisco catalyst_3560x-24u-s -
cisco catalyst_3560x-48p-e -
cisco catalyst_3560x-48p-l -
cisco catalyst_3560x-48p-s -
cisco catalyst_3560x-48pf-e -
cisco catalyst_3560x-48pf-l -
cisco catalyst_3560x-48pf-s -
cisco catalyst_3560x-48t-e -
cisco catalyst_3560x-48t-l -
cisco catalyst_3560x-48t-s -
cisco catalyst_3560x-48u-e -
cisco catalyst_3560x-48u-l -
cisco catalyst_3560x-48u-s -
cisco catalyst_3750-24fs -
cisco catalyst_3750-24ps -
cisco catalyst_3750-24ts -
cisco catalyst_3750-48ps -
cisco catalyst_3750-48ts -
cisco catalyst_3750_metro_24-ac -
cisco catalyst_3750_metro_24-dc -
cisco catalyst_3750e-24pd-e -
cisco catalyst_3750e-24pd-s -
cisco catalyst_3750e-24td-e -
cisco catalyst_3750e-24td-s -
cisco catalyst_3750e-48pd-e -
cisco catalyst_3750e-48pd-ef -
cisco catalyst_3750e-48pd-s -
cisco catalyst_3750e-48pd-sf -
cisco catalyst_3750e-48td-e -
cisco catalyst_3750e-48td-s -
cisco catalyst_3750g-12s -
cisco catalyst_3750g-12s-sd -
cisco catalyst_3750g-16td -
cisco catalyst_3750g-24ps -
cisco catalyst_3750g-24t -
cisco catalyst_3750g-24ts -
cisco catalyst_3750g-24ts-1u -
cisco catalyst_3750g-48ps -
cisco catalyst_3750g-48ts -
cisco catalyst_3750v2-24fs -
cisco catalyst_3750v2-24ps -
cisco catalyst_3750v2-24ts -
cisco catalyst_3750v2-48ps -
cisco catalyst_3750v2-48ts -
cisco catalyst_3750x-12s-e -
cisco catalyst_3750x-12s-s -
cisco catalyst_3750x-24p-e -
cisco catalyst_3750x-24p-l -
cisco catalyst_3750x-24p-s -
cisco catalyst_3750x-24s-e -
cisco catalyst_3750x-24s-s -
cisco catalyst_3750x-24t-e -
cisco catalyst_3750x-24t-l -
cisco catalyst_3750x-24t-s -
cisco catalyst_3750x-24u-e -
cisco catalyst_3750x-24u-l -
cisco catalyst_3750x-24u-s -
cisco catalyst_3750x-48p-e -
cisco catalyst_3750x-48p-l -
cisco catalyst_3750x-48p-s -
cisco catalyst_3750x-48pf-e -
cisco catalyst_3750x-48pf-l -
cisco catalyst_3750x-48pf-s -
cisco catalyst_3750x-48t-e -
cisco catalyst_3750x-48t-l -
cisco catalyst_3750x-48t-s -
cisco catalyst_3750x-48u-e -
cisco catalyst_3750x-48u-l -
cisco catalyst_3750x-48u-s -
cisco catalyst_4000_supervisor_engine_i -
cisco catalyst_4000_supervisor_engine_iv -
cisco catalyst_4000_supervisor_engine_v -
cisco catalyst_4500_supervisor_engine_6-e -
cisco catalyst_4500_supervisor_engine_6l-e -
cisco catalyst_4500_supervisor_engine_ii-plus -
cisco catalyst_4500_supervisor_engine_ii-plus-ts -
cisco catalyst_4500_supervisor_engine_iv -
cisco catalyst_4500_supervisor_engine_v -
cisco catalyst_4500_supervisor_engine_v-10ge -
cisco catalyst_4500_supervisor_ii-plus-10ge -
cisco catalyst_4500e_supervisor_engine_8-e -
cisco catalyst_4900m -
cisco catalyst_4928_10_gigabit_ethernet_switch -
cisco catalyst_4948 -
cisco catalyst_4948_10_gigabit_ethernet_switch -
cisco catalyst_4948e-f_ethernet_switch -
cisco catalyst_4948e_ethernet_switch -
cisco catalyst_blade_switch_3020 -
cisco catalyst_blade_switch_3030 -
cisco catalyst_blade_switch_3032 -
cisco catalyst_blade_switch_3040 -
cisco catalyst_blade_switch_3120 -
cisco catalyst_blade_switch_3120x -
cisco catalyst_blade_switch_3130 -
cisco catalyst_c2928-24lt-c -
cisco catalyst_c2928-48tc-c -
cisco catalyst_switch_module_3012 -
cisco catalyst_switch_module_3110 -
cisco catalyst_switch_module_3110x -
cisco embedded_service_2020_24tc_con -
cisco embedded_service_2020_24tc_con_b -
cisco embedded_service_2020_24tc_ncp -
cisco embedded_service_2020_24tc_ncp_b -
cisco embedded_service_2020_con -
cisco embedded_service_2020_con_b -
cisco embedded_service_2020_ncp -
cisco embedded_service_2020_ncp_b -
cisco enhanced_layer_2\/3_etherswitch_service_module -
cisco enhanced_layer_2_etherswitch_service_module -
cisco gigabit_ethernet_switch_module_\(cgesm\) -
cisco ie-3010-16s-8pc_industrial_ethernet_switch -
cisco ie-3010-24tc_industrial_ethernet_switch -
cisco ie-4000-16gt4g-e_industrial_ethernet_switch -
cisco ie-4000-16t4g-e_industrial_ethernet_switch -
cisco ie-4000-4gc4gp4g-e_industrial_ethernet_switch -
cisco ie-4000-4gs8gp4g-e_industrial_ethernet_switch -
cisco ie-4000-4s8p4g-e_industrial_ethernet_switch -
cisco ie-4000-4t4p4g-e_industrial_ethernet_switch -
cisco ie-4000-4tc4g-e_industrial_ethernet_switch -
cisco ie-4000-8gs4g-e_industrial_ethernet_switch -
cisco ie-4000-8gt4g-e_industrial_ethernet_switch -
cisco ie-4000-8gt8gp4g-e_industrial_ethernet_switch -
cisco ie-4000-8s4g-e_industrial_ethernet_switch -
cisco ie-4000-8t4g-e_industrial_ethernet_switch -
cisco ie-4010-16s12p_industrial_ethernet_switch -
cisco ie-4010-4s24p_industrial_ethernet_switch -
cisco ie-5000-12s12p-10g_industrial_ethernet_switch -
cisco ie-5000-16s12p_industrial_ethernet_switch -
cisco ie_2000-16ptc-g_industrial_ethernet_switch -
cisco ie_2000-16t67_industrial_ethernet_switch -
cisco ie_2000-16t67p_industrial_ethernet_switch -
cisco ie_2000-16tc-g-e_industrial_ethernet_switch -
cisco ie_2000-16tc-g-n_industrial_ethernet_switch -
cisco ie_2000-16tc-g-x_industrial_ethernet_switch -
cisco ie_2000-16tc-g_industrial_ethernet_switch -
cisco ie_2000-16tc_industrial_ethernet_switch -
cisco ie_2000-24t67_industrial_ethernet_switch -
cisco ie_2000-4s-ts-g_industrial_ethernet_switch -
cisco ie_2000-4t-g_industrial_ethernet_switch -
cisco ie_2000-4t_industrial_ethernet_switch -
cisco ie_2000-4ts-g_industrial_ethernet_switch -
cisco ie_2000-4ts_industrial_ethernet_switch -
cisco ie_2000-8t67_industrial_ethernet_switch -
cisco ie_2000-8t67p_industrial_ethernet_switch -
cisco ie_2000-8tc-g-e_industrial_ethernet_switch -
cisco ie_2000-8tc-g-n_industrial_ethernet_switch -
cisco ie_2000-8tc-g_industrial_ethernet_switch -
cisco ie_2000-8tc_industrial_ethernet_switch -
cisco ie_3000-4tc_industrial_ethernet_switch -
cisco ie_3000-8tc_industrial_ethernet_switch -
cisco me_4924-10ge -
cisco rf_gateway_10 -
cisco sm-x_layer_2\/3_etherswitch_service_module -



{
  "cisaActionDue": "2022-04-15",
  "cisaExploitAdd": "2022-03-25",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F6546FC-F719-4FC2-ACB1-E558687769EC",
              "versionEndIncluding": "15.1\\(3\\)svs",
              "versionStartIncluding": "12.2s",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588833B-3B46-4968-8710-C244AB2C7BB6",
              "versionEndIncluding": "3.9e",
              "versionStartIncluding": "3.2sg",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7301CDF-48BB-4E4B-862A-28B2A742D67B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "409044EC-4B25-4C7F-B20F-26CD79EEE49F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4533989C-CCDC-464A-AB68-29A752FA0759",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487A1994-9FF2-4F15-9F38-C5B5218221DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "234DD8AF-D938-4E20-89FE-E34F54EFF2F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A546FA79-654C-4CE9-9F6B-8F49255500F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E8F619-55BA-45E4-B75E-A64E9452F7AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CE5551-B4ED-4554-9012-09A7CF7A5D88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69384D20-0270-4CD5-95D0-7EA93CBDE78E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07F566D-BCAC-44EC-AB37-6FA870D4AEDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63946130-E5AB-476A-98AB-3BB49B7EBD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9D08FF-DD21-4AAE-ABB5-561CD80D52AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C594EB3-FECD-4E88-8945-B9CD5EF6CA66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E79AB1-9C7D-4E72-8038-60B62D3F771B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "784EF30F-54A7-46D8-B9E5-8CA2883563DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6061A1-706D-4129-B99B-318EACB7AB3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3FFD5C-1AC5-4D1D-9A66-9167F72E4C6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8E6604-7F57-4147-A4D9-7A37B415D794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28218B4-23E0-4319-BE93-F09FB552F7D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "042A0AA5-FC1B-451E-92A4-1E3C309B0C00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8D63435-4DC4-4597-AADE-89BCF470B109",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D51A01-A213-4BB1-84C5-7D29D28A81CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D562C004-24DE-4B9D-A323-C3D2EA32A173",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D86BAF5-681F-4867-A657-D4724F748707",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AD8E261-E81F-4E09-8006-3D878EF61E0F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAF5C54-CCFB-48E4-9384-A01867948BA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0CC74-2523-4F85-B54C-C46455613064",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "923B1623-2A33-497B-9238-3F4699E8E4AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "762B1BA4-69FC-4977-A0A8-9323660674A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F249629F-1A5C-4C12-B956-552A2526A836",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9AF097-09D6-4388-85EA-5954BD40D6B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "949533D3-6500-49BA-BE55-42E1506D3DD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E5B561-02A2-4F79-8E28-E6A2B5C4F09D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBE7411-BD02-47A8-99BC-6B701B60A61B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96195B6B-C869-4DEF-AB5D-704B3D2FC76E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9CB655-99FB-42F3-A2BB-2A297B02EC2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "909A8DAE-5397-4B9B-8CDA-9B00712D6D6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5193F631-B2A8-48D2-8DC7-AE2365FA2DEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B842CBE4-C180-4C72-AC61-E8FD522C902F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0BB74CE-1822-48B4-BB5B-131794A2BC14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FBA8D-0CA3-49A9-B703-4CDF1E8DFAE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A19A8A62-4FCF-43D4-B266-CB00A8217449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC2757-2107-477A-B4D1-C6D2419DFBD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D79CF40-2070-48E3-8135-F9893226D400",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E7A2E1-D356-470F-9D04-C743BE70B6E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5237B60-ACF2-473F-B822-27792A07CBC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C4C143-1CF6-4429-8BA0-7BE782032D30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA8BBAA-E651-4626-B31D-39EA4F04D6BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DACEA494-E9DC-4F74-A252-259CC93E2741",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7E87CD-D6B7-4C7C-8627-BADB993A6D72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299DC29B-A5DC-4137-A95A-DCC85E9C59B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482285C-D0C6-4BA3-8ACF-8461B91FDF82",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E02CA96-ED16-410B-B51A-AA29B6E5667E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61467987-235B-4D06-83D2-5DF5A51E4DE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0E46E6-C885-4184-8EA9-C7323A482A19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C7EA43F-8B3A-4636-B2BF-010E141C5710",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D8ACB8-850C-4967-9D42-B8F162259FF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E14120-1B3E-4A70-B875-4EE5B979711B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "188AE176-297C-4EB6-B048-B2743864A454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A09201-D66C-482D-950C-8B13B6BE69A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A9CFC23-8C33-43F9-B5DE-1FA4D7CB2A0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DED5868-C623-48B7-8D04-BA5442B772BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2C33A-A76D-4600-9A7E-F5E5C93FB71E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF53A7E-9933-4AE8-B5A5-7A4657DF17A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207E453A-F004-486A-A36A-4B120647E3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5403BF-948F-493C-AB10-4C5239DDA975",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0EBD95-F0EB-4AE5-8C11-987C3DA5F6AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE73686A-5BDB-407B-99DB-2FC7107EA2ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15EFDB4-AB6B-4194-A8DA-47EFC5435A9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A11434F-D3CD-4F88-888B-82262837B752",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFA401A-8C8C-4DD8-9795-5F38977D2D90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F56B4661-3FF4-4610-9DA9-8A2E87C059B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71BB343B-D016-46BB-8520-3F29A639C183",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDEFF5D-40DC-410A-A781-44981DE9A3CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DCABE7A-783A-4E93-A762-520E653E161E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D69F868-A419-48EA-8F99-A62CDEFA483D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F070996F-B01C-42F3-9CE7-8ACAB89ACD70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB109071-3FE4-4610-A9FF-2E7FEEF23E0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1821EB-F2F9-4293-A92C-70C4627623D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F123F41-1B78-45F2-98EE-3BF74CBD8112",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8C6BCE4-6D58-4CA1-810A-4427E4235DB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D922479-A8F4-4419-A450-AE1A97C480DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C15A3C-07C0-4385-BC5E-A7FB3D4B7B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D306E3-6D0A-4B53-BD70-AE3D4CDD6DCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A4BFC9-BA3D-43FF-8E8B-CBA87D9FED4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC8425C-509A-43BB-865E-EB5DDE007222",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB67C-F5C1-4508-9817-CA25A5D12EEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B55075-2EB6-4511-9ADC-70F2314D7C98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331FED4B-B014-4B2F-B2F4-A82CB18F60B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "098C6C37-0785-4224-92D5-A8E1AB4A24F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B91443C6-40C3-4EB1-93C5-1F25E99C7346",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A018451F-D2C4-40C1-A277-4D7A873F31F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A640842-EC2A-4603-BFC0-3F42EF01D3D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C71306-AA1F-4CC0-8E36-57F5EE374414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5C6319-C780-4C9D-971D-762BE23F3D92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9609F0A2-E891-46C8-A293-C4EC5093DA2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB2A727-4B95-4B2A-9B0F-90259330BFDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9601405-1541-4C8F-B388-85C73765D75C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D063818B-56EE-415B-89EF-C6C707637269",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7CF840-3C7B-4765-AFBE-84AA11E91956",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB69810E-900E-45BC-BD43-B7CA1DE722D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA05EEE-9039-430F-92DF-B3E4A52A18F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3CDFEB-8B08-4912-896A-72F1BAFD47A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AB18A03-6D49-489B-9F27-DF19D3AC0DAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A75271-D05C-4C91-A99A-C03BE49C9110",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45931DC1-552D-44F2-9327-8490A9B45BF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED46E2B-6398-435C-ABC0-7C6B226FB55D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA5D6BBD-C589-44DD-9C14-12CBCC716610",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBFCA2CC-2F4A-4489-A3D6-3174350EB879",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EEF9CF-19AE-4A21-88D5-06A45B972651",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D817D90-A7BA-4CA8-BA5C-FA82CA31F620",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD2F469-8E06-43D3-B458-0437352D5F47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E711BA-BBF0-4E1A-B84C-2449E4CB8BA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED3981C-C68B-4697-9AB3-A9BD6249B1E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A7E1F3-AB1E-452C-9FA4-DD24680F65D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CD713C-BF36-4BCA-8BC6-55418E038136",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C402FF8B-6EA1-406B-9DB7-E2D8939CFFFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C30EF3-A63D-4022-A032-77C376AD9DA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C36E5D-F471-4002-854B-93DFFFEF471C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12B41FC2-D482-4CF7-ADAC-720CCD4C5648",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40C98C14-96EB-4AF5-9090-842234BB0855",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E725C592-4ADF-4C06-958D-4BC725A0EA19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EC2EE0-F838-497D-92FD-1FD830564811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2937EE-0566-465E-9AE7-0BC97D02676E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0527FC9C-08FB-4AA5-AD59-9EEFBEFF6F53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0799AF-3CBB-4749-9314-9DF3A93C7D44",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDE0913-7E59-4741-B0D9-EC6C90C5E21C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808DEBC5-0249-491C-9607-9263F781BCDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15AF91D-A937-4F0B-88F9-B0EDEE7CE9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB558C8-826C-486A-B7CF-1E0EC0A7A106",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC95D92-296F-4671-9191-29CED1C38070",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B334CAF-50A9-4214-AA09-71617C1235A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65AA2DC-C7FC-48F9-B481-920793CCD004",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7D6BCA-376D-40DE-88AF-358A23AEB25C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:enhanced_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9861A7C6-9AC2-4B84-B86E-56BEA7A84774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1526DA59-4077-44CF-A42C-56EC36EFFA76",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\(cgesm\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B0E5E0-92ED-4AFF-BF81-A48AA6E9DC51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0071F74-A0D3-45FE-8F58-F2F4D64AA0A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "095B70C4-0551-42BB-88B3-602DA9AE7C18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45EC8751-C17A-4F75-B88A-5778E2496462",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C52B1C4-A42A-42AC-ABB3-F2B289F47B8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19155C80-7068-4E3A-88EA-9F90C1B14ABC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64234EBB-B47D-4B2A-A46D-2AA234E0ECC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C4975AA-722F-43AB-A762-88D5A00FC7EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76C5B3B-03FF-47C0-88B1-A5AB932D02DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA64B716-2D79-4B4E-8007-C4575AA68E8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "763B3611-7EE1-455F-96C7-0A2E83D22AF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2D391F-27DE-48E6-9AA3-36A8C672A6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE4E5E0-F7E8-43BC-9AFC-159D6B2B4344",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BBAC7B1-693D-40F8-90BB-6290E3DCD5A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43AF8063-E30D-411B-9CEC-25E336E5E4E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A359421-6CD3-43E0-94FC-20C76756C7EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F9DF32-3E0B-47FA-912A-FCE948BA768E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDCB2A84-541D-44A6-ABDA-67A3A6DFC80F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE187051-5443-44D9-A0F8-2D351D2E4372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F63F4C5-7784-4B83-B454-E9731210920B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89AEB2-8690-4389-A896-10430A690243",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D464787-DC79-474F-84CA-2B4AD209C21F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFC9C43-2BAE-4F4E-B084-F9FB54EEF6D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6EAC97A-E3FC-490F-9D02-8CA8FA87D6DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B0F4029-9E79-4ADE-A851-72F18635A492",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C224EE6-1436-4F11-94A8-4CC96A5001F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A4E545-9F74-40CC-8212-11798AF8D611",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D817838-BDA5-4ED8-8EC9-6C5F4C3C9C5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842352DA-0E9B-4520-9B32-C766BEA7BF9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66521F18-9C3D-4323-AFC1-5A4ABC476084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E62F6C8-1B96-4093-8E54-05B0086842A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D3398-D9AE-4447-8D21-03853B41594E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27364811-6885-49B9-ADE7-55CD69105EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F72F96-3272-432C-A8B8-781C95D65A5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "036F4AFB-CBAA-4155-AC79-B2DC38E37613",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9725FF2E-25DB-42EB-B504-B169392D6C31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "683C46D6-6DBD-4C99-A577-4CE624DEDD8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA132B36-55CB-492A-8B85-715201E7712F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABD77B1-BF1E-4748-A965-08D19E323D78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7DA136-4146-439B-A27B-013F353382B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3374CF70-3F34-448D-ABA0-EEF1C79DC4BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D304B8-89EB-45DE-BEA3-564028842BB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18233C3F-7F08-4E97-BEC1-30B336E92511",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:sm-x_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F16053-2839-4A59-B2A7-7E642BD26BE7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el c\u00f3digo de procesamiento de Cisco Cluster Management Protocol (CMP) en Cisco IOS y Cisco IOS XE Software podr\u00eda permitir a un atacante remoto no autenticado provocar una recarga de un dispositivo afectado o ejecutar c\u00f3digo remotamente con privilegios elevados. El Cluster Management Protocol utiliza internamente Telnet como un protocolo de se\u00f1alizaci\u00f3n y comando entre los miembros del cl\u00faster. La vulnerabilidad se debe a la combinaci\u00f3n de dos factores: (1) la imposibilidad de restringir el uso de las opciones Telnet espec\u00edficas de CMP s\u00f3lo a las comunicaciones locales internas entre los miembros del cl\u00faster y, en cambio, aceptar y procesar dichas opciones a trav\u00e9s de cualquier conexi\u00f3n Telnet con un dispositivo afectado; y (2) el procesamiento incorrecto de las opciones malformadas de Telnet espec\u00edficas de CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando opciones malformadas de Telnet espec\u00edficas de CMP mientras establec\u00eda una sesi\u00f3n Telnet con un dispositivo Cisco afectado configurado para aceptar conexiones Telnet. Un exploit podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario y obtener el control total del dispositivo o provocar una recarga del dispositivo afectado. Esto afecta a los conmutadores Catalyst, los conmutadores Embedded Service 2020, el m\u00f3dulo de servicio Enhanced Layer 2 EtherSwitch, el m\u00f3dulo de servicio Enhanced Layer 2/3 EtherSwitch, el conmutador Gigabit Ethernet (CGESM) para HP, los conmutadores IE Industrial Ethernet, el conmutador ME 4924-10GE, la pasarela RF 10 , y m\u00f3dulo de servicio EtherSwitch de capa 2/3 SM-X. ID de errores de Cisco: CSCvd48893."
    }
  ],
  "id": "CVE-2017-3881",
  "lastModified": "2024-11-21T03:26:18.337",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-17T22:59:00.640",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/96960"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97391"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038059"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41872/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.exploit-db.com/exploits/41874/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/96960"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41872/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.exploit-db.com/exploits/41874/"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-15 15:15
Modified
2024-11-21 06:43
Summary
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
Impacted products
Vendor Product Version
cisco cgr1000_compute_module *
cisco ic3000_industrial_compute_gateway *
cisco ir510_operating_system *
cisco ios 15.2\(5\)e1
cisco ios 15.2\(5\)e2c
cisco ios 15.2\(6\)e0a
cisco ios 15.2\(6\)e1
cisco ios 15.2\(6\)e2a
cisco ios 15.2\(7\)e
cisco ios 15.2\(7\)e0b
cisco ios 15.2\(7\)e0s
cisco ios 15.6\(1\)t1
cisco ios 15.6\(1\)t2
cisco ios 15.6\(1\)t3
cisco ios 15.6\(2\)t
cisco ios 15.6\(2\)t0a
cisco ios 15.6\(2\)t1
cisco ios 15.6\(2\)t2
cisco ios 15.6\(2\)t3
cisco ios 15.6\(3\)m
cisco ios 15.6\(3\)m0a
cisco ios 15.6\(3\)m1
cisco ios 15.6\(3\)m1a
cisco ios 15.6\(3\)m1b
cisco ios 15.6\(3\)m2
cisco ios 15.6\(3\)m2a
cisco ios 15.6\(3\)m3
cisco ios 15.6\(3\)m3a
cisco ios 15.6\(3\)m4
cisco ios 15.6\(3\)m5
cisco ios 15.6\(3\)m6
cisco ios 15.6\(3\)m6a
cisco ios 15.6\(3\)m6b
cisco ios 15.6\(3\)m7
cisco ios 15.6\(3\)m8
cisco ios 15.6\(3\)m9
cisco ios 15.7\(3\)m
cisco ios 15.7\(3\)m0a
cisco ios 15.7\(3\)m1
cisco ios 15.7\(3\)m2
cisco ios 15.7\(3\)m3
cisco ios 15.7\(3\)m4
cisco ios 15.7\(3\)m4a
cisco ios 15.7\(3\)m4b
cisco ios 15.7\(3\)m5
cisco ios 15.7\(3\)m6
cisco ios 15.7\(3\)m7
cisco ios 15.7\(3\)m8
cisco ios 15.7\(3\)m9
cisco ios 15.8\(3\)m
cisco ios 15.8\(3\)m0a
cisco ios 15.8\(3\)m0b
cisco ios 15.8\(3\)m1
cisco ios 15.8\(3\)m1a
cisco ios 15.8\(3\)m2
cisco ios 15.8\(3\)m2a
cisco ios 15.8\(3\)m3
cisco ios 15.8\(3\)m3a
cisco ios 15.8\(3\)m3b
cisco ios 15.8\(3\)m4
cisco ios 15.8\(3\)m5
cisco ios 15.8\(3\)m6
cisco ios 15.8\(3\)m7
cisco ios 15.9\(3\)m
cisco ios 15.9\(3\)m0a
cisco ios 15.9\(3\)m1
cisco ios 15.9\(3\)m2
cisco ios 15.9\(3\)m2a
cisco ios 15.9\(3\)m3
cisco ios 15.9\(3\)m3a
cisco ios 15.9\(3\)m3b
cisco ios 15.9\(3\)m4
cisco ios 15.9\(3\)m4a
cisco ios_xe 16.3.1
cisco ios_xe 16.3.1a
cisco ios_xe 16.3.2
cisco ios_xe 16.3.3
cisco ios_xe 16.3.4
cisco ios_xe 16.3.5
cisco ios_xe 16.3.5b
cisco ios_xe 16.3.6
cisco ios_xe 16.3.7
cisco ios_xe 16.3.8
cisco ios_xe 16.3.9
cisco ios_xe 16.3.10
cisco ios_xe 16.3.11
cisco ios_xe 16.4.1
cisco ios_xe 16.4.2
cisco ios_xe 16.4.3
cisco ios_xe 16.5.1
cisco ios_xe 16.5.1a
cisco ios_xe 16.5.1b
cisco ios_xe 16.5.2
cisco ios_xe 16.5.3
cisco ios_xe 16.6.1
cisco ios_xe 16.6.2
cisco ios_xe 16.6.3
cisco ios_xe 16.6.4
cisco ios_xe 16.6.4a
cisco ios_xe 16.6.4s
cisco ios_xe 16.6.5
cisco ios_xe 16.6.5a
cisco ios_xe 16.6.5b
cisco ios_xe 16.6.6
cisco ios_xe 16.6.7
cisco ios_xe 16.6.7a
cisco ios_xe 16.6.8
cisco ios_xe 16.6.9
cisco ios_xe 16.6.10
cisco ios_xe 16.7.1
cisco ios_xe 16.7.1a
cisco ios_xe 16.7.1b
cisco ios_xe 16.7.2
cisco ios_xe 16.7.3
cisco ios_xe 16.7.4
cisco ios_xe 16.8.1
cisco ios_xe 16.8.1a
cisco ios_xe 16.8.1b
cisco ios_xe 16.8.1c
cisco ios_xe 16.8.1d
cisco ios_xe 16.8.1e
cisco ios_xe 16.8.1s
cisco ios_xe 16.8.2
cisco ios_xe 16.8.3
cisco ios_xe 16.9.1
cisco ios_xe 16.9.1a
cisco ios_xe 16.9.1b
cisco ios_xe 16.9.1c
cisco ios_xe 16.9.1d
cisco ios_xe 16.9.1s
cisco ios_xe 16.9.2
cisco ios_xe 16.9.2a
cisco ios_xe 16.9.2s
cisco ios_xe 16.9.3
cisco ios_xe 16.9.3a
cisco ios_xe 16.9.3h
cisco ios_xe 16.9.3s
cisco ios_xe 16.9.4
cisco ios_xe 16.9.4c
cisco ios_xe 16.9.5
cisco ios_xe 16.9.5f
cisco ios_xe 16.9.6
cisco ios_xe 16.9.7
cisco ios_xe 16.9.8
cisco ios_xe 16.10.1
cisco ios_xe 16.10.1a
cisco ios_xe 16.10.1b
cisco ios_xe 16.10.1c
cisco ios_xe 16.10.1d
cisco ios_xe 16.10.1e
cisco ios_xe 16.10.1f
cisco ios_xe 16.10.1g
cisco ios_xe 16.10.1s
cisco ios_xe 16.10.2
cisco ios_xe 16.10.3
cisco ios_xe 16.11.1
cisco ios_xe 16.11.1a
cisco ios_xe 16.11.1b
cisco ios_xe 16.11.1c
cisco ios_xe 16.11.1s
cisco ios_xe 16.11.2
cisco ios_xe 16.12.1
cisco ios_xe 16.12.1a
cisco ios_xe 16.12.1c
cisco ios_xe 16.12.1s
cisco ios_xe 16.12.1t
cisco ios_xe 16.12.1w
cisco ios_xe 16.12.1x
cisco ios_xe 16.12.1y
cisco ios_xe 16.12.2
cisco ios_xe 16.12.2a
cisco ios_xe 16.12.2s
cisco ios_xe 16.12.2t
cisco ios_xe 16.12.3
cisco ios_xe 16.12.3a
cisco ios_xe 16.12.3s
cisco ios_xe 16.12.4
cisco ios_xe 16.12.4a
cisco ios_xe 16.12.5
cisco ios_xe 16.12.5a
cisco ios_xe 17.1.1
cisco ios_xe 17.1.1a
cisco ios_xe 17.1.1s
cisco ios_xe 17.1.1t
cisco ios_xe 17.1.2
cisco ios_xe 17.1.3
cisco ios_xe 17.2.1
cisco ios_xe 17.2.1a
cisco ios_xe 17.2.1r
cisco ios_xe 17.2.1v
cisco ios_xe 17.2.2
cisco ios_xe 17.2.3
cisco ios_xe 17.3.1
cisco ios_xe 17.3.1a
cisco ios_xe 17.3.1w
cisco ios_xe 17.3.1x
cisco ios_xe 17.3.1z
cisco ios_xe 17.3.2
cisco ios_xe 17.3.2a
cisco ios_xe 17.3.3
cisco ios_xe 17.3.3a
cisco ios_xe 17.3.4
cisco ios_xe 17.3.4a
cisco ios_xe 17.3.4b
cisco ios_xe 17.3.4c
cisco ios_xe 17.4.1
cisco ios_xe 17.4.1a
cisco ios_xe 17.4.1b
cisco ios_xe 17.4.1c
cisco ios_xe 17.4.2
cisco ios_xe 17.4.2a
cisco ios_xe 17.5.1
cisco ios_xe 17.5.1a
cisco ios_xe 17.6.1
cisco ios_xe 17.6.1a
cisco 800m_integrated_services_router -
cisco 807_industrial_integrated_services_router -
cisco 812_3g_integrated_services_router -
cisco 812_cifi_integrated_services_router -
cisco 819_hardened_dual_radio_802.11n_wifi_integrated_services_router -
cisco 819_hardened_integrated_services_router -
cisco 829_industrial_integrated_services_router -
cisco 860vae-w_integrated_services_router -
cisco 861_integrated_services_router -
cisco 861w_integrated_services_router -
cisco 866vae_integrated_services_router -
cisco 867_integrated_services_router -
cisco 867vae_integrated_services_router -
cisco 880-voice_integrated_services_router -
cisco 880_3g_integrated_services_router -
cisco 881-cube_integrated_services_router -
cisco 881_3g_integrated_services_router -
cisco 881_integrated_services_router -
cisco 881w_integrated_services_router -
cisco 886_integrated_services_router -
cisco 886va-cube_integrated_services_router -
cisco 886va-w_integrated_services_router -
cisco 886va_integrated_services_router -
cisco 886vag_3g_integrated_services_router -
cisco 887_integrated_services_router -
cisco 887v_integrated_services_router -
cisco 887va-cube_integrated_services_router -
cisco 887va-w_integrated_services_router -
cisco 887va_integrated_services_router -
cisco 887vag_3g_integrated_services_router -
cisco 887vam-w_integrated_services_router -
cisco 887vamg_3g_integrated_services_router -
cisco 888-cube_integrated_services_router -
cisco 888_integrated_services_router -
cisco 888e-cube_integrated_services_router -
cisco 888e_integrated_services_router -
cisco 888eg_3g_integrated_services_router -
cisco 888w_integrated_services_router -
cisco 891-24x_integrated_services_router -
cisco 891_integrated_services_router -
cisco 891w_integrated_services_router -
cisco 892_integrated_services_router -
cisco 892f-cube_integrated_services_router -
cisco 892w_integrated_services_router -
cisco cgr_1000 -
cisco cgr_1120 -
cisco cgr_1240 -
cisco ic3000_industrial_compute_gateway -
cisco ie-4000-16gt4g-e_industrial_ethernet_switch -
cisco ie-4000-16t4g-e_industrial_ethernet_switch -
cisco ie-4000-4gc4gp4g-e_industrial_ethernet_switch -
cisco ie-4000-4gs8gp4g-e_industrial_ethernet_switch -
cisco ie-4000-4s8p4g-e_industrial_ethernet_switch -
cisco ie-4000-4t4p4g-e_industrial_ethernet_switch -
cisco ie-4000-4tc4g-e_industrial_ethernet_switch -
cisco ie-4000-8gs4g-e_industrial_ethernet_switch -
cisco ie-4000-8gt4g-e_industrial_ethernet_switch -
cisco ie-4000-8gt8gp4g-e_industrial_ethernet_switch -
cisco ie-4000-8s4g-e_industrial_ethernet_switch -
cisco ie-4000-8t4g-e_industrial_ethernet_switch -
cisco ie-4010-16s12p_industrial_ethernet_switch -
cisco ie-4010-4s24p_industrial_ethernet_switch -
cisco ir510_wpan -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:cgr1000_compute_module:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD4C0D6-AB7B-48B5-B1BD-8EBAEAC51524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9AF42D-A861-4585-8FA6-28BD3623681E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A90577A5-5077-4A3C-87D8-63A77B7FBE30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "691BA27E-77AB-4A30-916D-3BB916B05298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B688E46-5BAD-4DEC-8B13-B184B141B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A6CF7-9104-4882-9C95-E6D4458AB778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
              "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89369318-2E83-489F-B872-5F2E247BBF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
              "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35FFA44-9A59-4C20-9D86-C40B68BD5F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "298C82F9-79A6-4DB7-8432-8B3A6DA39620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:800m_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9F9D3C-8221-4C79-97A3-9FEA81DE977F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:807_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EEA0369-B5B1-41FD-98EE-F7F4EAB9863D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:812_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0EEEB5-8305-4A57-9904-D81551FB6A81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:812_cifi_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D371C4-7034-4675-931D-E6A208FD901C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:819_hardened_dual_radio_802.11n_wifi_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF3EFC2-EF88-47E6-B174-7561A19FB543",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:819_hardened_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FCD835-282D-440A-833D-771F6EC7A93D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "398D63B0-F15B-409B-AFBC-DE6C94FAF815",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:860vae-w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9C511D-7D5E-4758-A335-70019EBD9F8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E109E908-78B9-44ED-8719-B057057C2185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:861w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F8D515-3D54-459F-8CE7-FFA91439C0D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:866vae_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "510B60EF-AA4D-469F-8EEF-133F354DDF55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:867_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF7E6C9E-326B-42EF-86D4-4FB2C13E2BA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:867vae_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D562373-BD3F-4690-928F-9FE0325A3379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:880-voice_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB62165B-6CA9-4DD8-8A36-B658F61FF9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:880_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2F1852-8ADC-42E0-8D05-961A733523D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:881-cube_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA5ACE25-8C18-49B0-AFFC-17CB30F61930",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:881_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6E4CF5-D944-4281-94E5-72BC5437BC62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:881_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB6E8CC-89B8-490A-BFCF-FA9D55543B21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:881w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "480629DC-DA23-4A9E-B90F-E8AB894C9353",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:886_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEBDDE6-0EA0-4C2B-9A04-87236312A269",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:886va-cube_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3EA60A-1BA9-43E8-AF81-914846C26CC1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7C5306-B810-4036-A241-7178F48ABE8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5413C7E7-F55C-4158-ABDF-2D8844B96680",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:886vag_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6745ADF-DCE3-42C3-A548-F9E44AEE88CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFD38B2-348F-4EF2-A9B7-40A9AA5FF511",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887v_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F9EA2E-9EE7-4F68-9765-C78F85624F2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887va-cube_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1563AC8D-4E4D-4126-8C5D-84B449AAEF57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3945CCD-E6F5-412D-9935-160BCD664B10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0C23393-F7BB-4BA9-81A5-C298D84EBF0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887vag_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B623C2-D81B-430B-9FD2-E2764EE94809",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887vam-w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "828E07F6-1E92-4990-AEBC-DBFE4B5B2DE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:887vamg_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B77C60-06E0-47FF-8CD4-35FE5C60FF95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:888-cube_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E97DA13-D485-42BE-A0E9-F40A0C823735",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E984A1EA-728A-4663-8494-1787AB5D93C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:888e-cube_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D9B6C7-A707-41CD-953F-5773FB3F7685",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:888e_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E154A-5586-4F58-8203-EC8256E00BAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:888eg_3g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CC0F79A-52CA-46A6-9C6A-0596718053E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:888w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8054E665-E4DA-4453-A34B-830B69D273A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:891-24x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA480B3-25E2-4B05-9F46-417B696789B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526558F9-C72D-4DDA-B0DF-CAF7B97E30C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:891w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B9D069-85C0-4299-BCAF-441A2D6227BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AFBDFF-3D83-4685-82EE-A9EA4DC09241",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:892f-cube_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB4AF464-B247-40CF-A2B5-1B278303418B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:892w_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D674C533-304A-42A4-97EE-1CA39908E888",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:cgr_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D4F35B7-7A47-45B7-967C-AB749BE346AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:cgr_1120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1119E8B9-53A3-4724-9EEB-F4A35F9F59E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:cgr_1240:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4089B3FB-EC0D-408D-A75E-942E23BECB72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ic3000_industrial_compute_gateway:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1DEE8B-C9B3-4E45-BBBD-C3DF2A61C349",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45EC8751-C17A-4F75-B88A-5778E2496462",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C52B1C4-A42A-42AC-ABB3-F2B289F47B8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19155C80-7068-4E3A-88EA-9F90C1B14ABC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64234EBB-B47D-4B2A-A46D-2AA234E0ECC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C4975AA-722F-43AB-A762-88D5A00FC7EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76C5B3B-03FF-47C0-88B1-A5AB932D02DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA64B716-2D79-4B4E-8007-C4575AA68E8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "763B3611-7EE1-455F-96C7-0A2E83D22AF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2D391F-27DE-48E6-9AA3-36A8C672A6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE4E5E0-F7E8-43BC-9AFC-159D6B2B4344",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BBAC7B1-693D-40F8-90BB-6290E3DCD5A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43AF8063-E30D-411B-9CEC-25E336E5E4E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A359421-6CD3-43E0-94FC-20C76756C7EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F9DF32-3E0B-47FA-912A-FCE948BA768E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ir510_wpan:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D29EAD2C-C9A3-4129-8C4F-1C0963826FA4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades en el entorno de alojamiento de aplicaciones Cisco IOx en varias plataformas de Cisco podr\u00edan permitir a un atacante inyectar comandos arbitrarios en el sistema operativo anfitri\u00f3n subyacente, ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n subyacente, instalar aplicaciones sin ser autenticado o conducir un ataque de tipo cross-site scripting (XSS) contra un usuario del software afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Details de este aviso"
    }
  ],
  "id": "CVE-2022-20725",
  "lastModified": "2024-11-21T06:43:25.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 4.2,
        "source": "ykramarz@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-15T15:15:13.510",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "ykramarz@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2022-20725
Vulnerability from cvelistv5
Published
2022-04-15 14:21
Modified
2024-11-06 16:23
Summary
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:49.219Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20725",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T15:58:50.327949Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:23:50.620Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-20T19:19:20",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4"
        }
      ],
      "source": {
        "advisory": "cisco-sa-iox-yuXQ6hFj",
        "defect": [
          [
            "CSCvx27640",
            "CSCvy16608",
            "CSCvy30903",
            "CSCvy30957",
            "CSCvy35913",
            "CSCvy35914",
            "CSCvy86583",
            "CSCvy86598",
            "CSCvy86602",
            "CSCvy86603",
            "CSCvy86604",
            "CSCvy86608"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOx Application Hosting Environment Vulnerabilities",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-04-13T16:00:00",
          "ID": "CVE-2022-20725",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOx Application Hosting Environment Vulnerabilities"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.5",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-22"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
            },
            {
              "name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4",
              "refsource": "MISC",
              "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-iox-yuXQ6hFj",
          "defect": [
            [
              "CSCvx27640",
              "CSCvy16608",
              "CSCvy30903",
              "CSCvy30957",
              "CSCvy35913",
              "CSCvy35914",
              "CSCvy86583",
              "CSCvy86598",
              "CSCvy86602",
              "CSCvy86603",
              "CSCvy86604",
              "CSCvy86608"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20725",
    "datePublished": "2022-04-15T14:21:02.732370Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-06T16:23:50.620Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-3881
Vulnerability from cvelistv5
Published
2017-03-17 22:00
Modified
2024-11-15 18:00
Severity ?
Summary
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:39:41.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41872",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41872/"
          },
          {
            "name": "41874",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41874/"
          },
          {
            "name": "97391",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97391"
          },
          {
            "name": "96960",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/96960"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
          },
          {
            "name": "1038059",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038059"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2017-3881",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T16:05:33.301931Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-03-25",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-3881"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T18:00:24.703Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS and IOS XE Software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco IOS and IOS XE Software"
            }
          ]
        }
      ],
      "datePublic": "2017-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution Vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-15T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "41872",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41872/"
        },
        {
          "name": "41874",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41874/"
        },
        {
          "name": "97391",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97391"
        },
        {
          "name": "96960",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/96960"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
        },
        {
          "name": "1038059",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038059"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2017-3881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS and IOS XE Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco IOS and IOS XE Software"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Remote Code Execution Vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41872",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41872/"
            },
            {
              "name": "41874",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41874/"
            },
            {
              "name": "97391",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97391"
            },
            {
              "name": "96960",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/96960"
            },
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
            },
            {
              "name": "1038059",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038059"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2017-3881",
    "datePublished": "2017-03-17T22:00:00",
    "dateReserved": "2016-12-21T00:00:00",
    "dateUpdated": "2024-11-15T18:00:24.703Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}