Search criteria
1620 vulnerabilities found for ios_xe by cisco
FKIE_CVE-2025-20352
Vulnerability from fkie_nvd - Published: 2025-09-24 18:15 - Updated: 2025-10-28 13:58
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:
An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials.
An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device.
An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks.
This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.
Note: This vulnerability affects all versions of SNMP.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios_xe_sd-wan | 16.9.1 | |
| cisco | ios_xe_sd-wan | 16.9.2 | |
| cisco | ios_xe_sd-wan | 16.9.3 | |
| cisco | ios_xe_sd-wan | 16.9.4 | |
| cisco | ios_xe_sd-wan | 16.10.1 | |
| cisco | ios_xe_sd-wan | 16.10.2 | |
| cisco | ios_xe_sd-wan | 16.10.3 | |
| cisco | ios_xe_sd-wan | 16.10.3a | |
| cisco | ios_xe_sd-wan | 16.10.3b | |
| cisco | ios_xe_sd-wan | 16.10.4 | |
| cisco | ios_xe_sd-wan | 16.10.5 | |
| cisco | ios_xe_sd-wan | 16.10.6 | |
| cisco | ios_xe_sd-wan | 16.11.1a | |
| cisco | ios_xe_sd-wan | 16.12.1b | |
| cisco | ios_xe_sd-wan | 16.12.1d | |
| cisco | ios_xe_sd-wan | 16.12.1e | |
| cisco | ios_xe_sd-wan | 16.12.2r | |
| cisco | ios_xe_sd-wan | 16.12.3 | |
| cisco | ios_xe_sd-wan | 16.12.4 | |
| cisco | ios_xe_sd-wan | 16.12.4a | |
| cisco | ios_xe_sd-wan | 16.12.5 | |
| cisco | ios_xe | 3.5.0e | |
| cisco | ios_xe | 3.5.0sq | |
| cisco | ios_xe | 3.5.1e | |
| cisco | ios_xe | 3.5.1sq | |
| cisco | ios_xe | 3.5.2e | |
| cisco | ios_xe | 3.5.2sq | |
| cisco | ios_xe | 3.5.3e | |
| cisco | ios_xe | 3.5.3sq | |
| cisco | ios_xe | 3.5.4sq | |
| cisco | ios_xe | 3.5.5sq | |
| cisco | ios_xe | 3.5.6sq | |
| cisco | ios_xe | 3.5.7sq | |
| cisco | ios_xe | 3.5.8sq | |
| cisco | ios_xe | 3.6.0e | |
| cisco | ios_xe | 3.6.1e | |
| cisco | ios_xe | 3.6.2ae | |
| cisco | ios_xe | 3.6.2e | |
| cisco | ios_xe | 3.6.3e | |
| cisco | ios_xe | 3.6.4e | |
| cisco | ios_xe | 3.6.5ae | |
| cisco | ios_xe | 3.6.5e | |
| cisco | ios_xe | 3.6.6e | |
| cisco | ios_xe | 3.6.7be | |
| cisco | ios_xe | 3.6.7e | |
| cisco | ios_xe | 3.6.8e | |
| cisco | ios_xe | 3.6.9e | |
| cisco | ios_xe | 3.6.10e | |
| cisco | ios_xe | 3.7.0e | |
| cisco | ios_xe | 3.7.1e | |
| cisco | ios_xe | 3.7.2e | |
| cisco | ios_xe | 3.7.3e | |
| cisco | ios_xe | 3.7.4e | |
| cisco | ios_xe | 3.7.5e | |
| cisco | ios_xe | 3.8.0e | |
| cisco | ios_xe | 3.8.1e | |
| cisco | ios_xe | 3.8.2e | |
| cisco | ios_xe | 3.8.3e | |
| cisco | ios_xe | 3.8.4e | |
| cisco | ios_xe | 3.8.5ae | |
| cisco | ios_xe | 3.8.5e | |
| cisco | ios_xe | 3.8.6e | |
| cisco | ios_xe | 3.8.7e | |
| cisco | ios_xe | 3.8.8e | |
| cisco | ios_xe | 3.8.9e | |
| cisco | ios_xe | 3.8.10e | |
| cisco | ios_xe | 3.9.0e | |
| cisco | ios_xe | 3.9.1e | |
| cisco | ios_xe | 3.9.2e | |
| cisco | ios_xe | 3.10.0ce | |
| cisco | ios_xe | 3.10.0e | |
| cisco | ios_xe | 3.10.1e | |
| cisco | ios_xe | 3.10.2e | |
| cisco | ios_xe | 3.10.3e | |
| cisco | ios_xe | 3.11.0e | |
| cisco | ios_xe | 3.11.1ae | |
| cisco | ios_xe | 3.11.1e | |
| cisco | ios_xe | 3.11.2e | |
| cisco | ios_xe | 3.11.3ae | |
| cisco | ios_xe | 3.11.3e | |
| cisco | ios_xe | 3.11.4e | |
| cisco | ios_xe | 3.11.5e | |
| cisco | ios_xe | 3.11.6e | |
| cisco | ios_xe | 3.11.7e | |
| cisco | ios_xe | 3.11.8e | |
| cisco | ios_xe | 3.11.9e | |
| cisco | ios_xe | 3.11.10e | |
| cisco | ios_xe | 3.11.11e | |
| cisco | ios_xe | 3.11.12e | |
| cisco | ios_xe | 3.14.0s | |
| cisco | ios_xe | 3.14.1s | |
| cisco | ios_xe | 3.14.2s | |
| cisco | ios_xe | 3.14.3s | |
| cisco | ios_xe | 3.14.4s | |
| cisco | ios_xe | 3.15.0s | |
| cisco | ios_xe | 3.15.1cs | |
| cisco | ios_xe | 3.15.1s | |
| cisco | ios_xe | 3.15.2s | |
| cisco | ios_xe | 3.15.3s | |
| cisco | ios_xe | 3.15.4s | |
| cisco | ios_xe | 3.16.0cs | |
| cisco | ios_xe | 3.16.0s | |
| cisco | ios_xe | 3.16.1as | |
| cisco | ios_xe | 3.16.1s | |
| cisco | ios_xe | 3.16.2as | |
| cisco | ios_xe | 3.16.2bs | |
| cisco | ios_xe | 3.16.2s | |
| cisco | ios_xe | 3.16.3as | |
| cisco | ios_xe | 3.16.3s | |
| cisco | ios_xe | 3.16.4as | |
| cisco | ios_xe | 3.16.4bs | |
| cisco | ios_xe | 3.16.4ds | |
| cisco | ios_xe | 3.16.4s | |
| cisco | ios_xe | 3.16.5s | |
| cisco | ios_xe | 3.16.6bs | |
| cisco | ios_xe | 3.16.6s | |
| cisco | ios_xe | 3.16.7as | |
| cisco | ios_xe | 3.16.7bs | |
| cisco | ios_xe | 3.16.7s | |
| cisco | ios_xe | 3.16.8s | |
| cisco | ios_xe | 3.16.9s | |
| cisco | ios_xe | 3.16.10s | |
| cisco | ios_xe | 3.17.0s | |
| cisco | ios_xe | 3.17.1as | |
| cisco | ios_xe | 3.17.1s | |
| cisco | ios_xe | 3.17.2s | |
| cisco | ios_xe | 3.17.3s | |
| cisco | ios_xe | 3.17.4s | |
| cisco | ios_xe | 3.18.0as | |
| cisco | ios_xe | 3.18.0s | |
| cisco | ios_xe | 3.18.0sp | |
| cisco | ios_xe | 3.18.1asp | |
| cisco | ios_xe | 3.18.1bsp | |
| cisco | ios_xe | 3.18.1csp | |
| cisco | ios_xe | 3.18.1s | |
| cisco | ios_xe | 3.18.1sp | |
| cisco | ios_xe | 3.18.2asp | |
| cisco | ios_xe | 3.18.2s | |
| cisco | ios_xe | 3.18.2sp | |
| cisco | ios_xe | 3.18.3asp | |
| cisco | ios_xe | 3.18.3bsp | |
| cisco | ios_xe | 3.18.3s | |
| cisco | ios_xe | 3.18.3sp | |
| cisco | ios_xe | 3.18.4s | |
| cisco | ios_xe | 3.18.4sp | |
| cisco | ios_xe | 3.18.5sp | |
| cisco | ios_xe | 3.18.6sp | |
| cisco | ios_xe | 3.18.7sp | |
| cisco | ios_xe | 3.18.8asp | |
| cisco | ios_xe | 3.18.9sp | |
| cisco | ios_xe | 16.6.1 | |
| cisco | ios_xe | 16.6.2 | |
| cisco | ios_xe | 16.6.3 | |
| cisco | ios_xe | 16.6.4 | |
| cisco | ios_xe | 16.6.4a | |
| cisco | ios_xe | 16.6.5 | |
| cisco | ios_xe | 16.6.5a | |
| cisco | ios_xe | 16.6.6 | |
| cisco | ios_xe | 16.6.7 | |
| cisco | ios_xe | 16.6.8 | |
| cisco | ios_xe | 16.6.9 | |
| cisco | ios_xe | 16.6.10 | |
| cisco | ios_xe | 16.7.1 | |
| cisco | ios_xe | 16.7.1a | |
| cisco | ios_xe | 16.7.1b | |
| cisco | ios_xe | 16.7.2 | |
| cisco | ios_xe | 16.7.3 | |
| cisco | ios_xe | 16.7.4 | |
| cisco | ios_xe | 16.8.1 | |
| cisco | ios_xe | 16.8.1a | |
| cisco | ios_xe | 16.8.1b | |
| cisco | ios_xe | 16.8.1c | |
| cisco | ios_xe | 16.8.1d | |
| cisco | ios_xe | 16.8.1e | |
| cisco | ios_xe | 16.8.1s | |
| cisco | ios_xe | 16.8.2 | |
| cisco | ios_xe | 16.8.3 | |
| cisco | ios_xe | 16.9.1 | |
| cisco | ios_xe | 16.9.1a | |
| cisco | ios_xe | 16.9.1b | |
| cisco | ios_xe | 16.9.1s | |
| cisco | ios_xe | 16.9.2 | |
| cisco | ios_xe | 16.9.3 | |
| cisco | ios_xe | 16.9.3a | |
| cisco | ios_xe | 16.9.4 | |
| cisco | ios_xe | 16.9.5 | |
| cisco | ios_xe | 16.9.5f | |
| cisco | ios_xe | 16.9.6 | |
| cisco | ios_xe | 16.9.7 | |
| cisco | ios_xe | 16.9.8 | |
| cisco | ios_xe | 16.10.1 | |
| cisco | ios_xe | 16.10.1a | |
| cisco | ios_xe | 16.10.1b | |
| cisco | ios_xe | 16.10.1c | |
| cisco | ios_xe | 16.10.1d | |
| cisco | ios_xe | 16.10.1e | |
| cisco | ios_xe | 16.10.1f | |
| cisco | ios_xe | 16.10.1g | |
| cisco | ios_xe | 16.10.1s | |
| cisco | ios_xe | 16.10.2 | |
| cisco | ios_xe | 16.10.3 | |
| cisco | ios_xe | 16.11.1 | |
| cisco | ios_xe | 16.11.1a | |
| cisco | ios_xe | 16.11.1b | |
| cisco | ios_xe | 16.11.1s | |
| cisco | ios_xe | 16.11.2 | |
| cisco | ios_xe | 16.12.1 | |
| cisco | ios_xe | 16.12.1a | |
| cisco | ios_xe | 16.12.1c | |
| cisco | ios_xe | 16.12.1s | |
| cisco | ios_xe | 16.12.1t | |
| cisco | ios_xe | 16.12.1w | |
| cisco | ios_xe | 16.12.1x | |
| cisco | ios_xe | 16.12.1y | |
| cisco | ios_xe | 16.12.1z1 | |
| cisco | ios_xe | 16.12.1z2 | |
| cisco | ios_xe | 16.12.2 | |
| cisco | ios_xe | 16.12.2a | |
| cisco | ios_xe | 16.12.2s | |
| cisco | ios_xe | 16.12.3 | |
| cisco | ios_xe | 16.12.3a | |
| cisco | ios_xe | 16.12.3s | |
| cisco | ios_xe | 16.12.4 | |
| cisco | ios_xe | 16.12.4a | |
| cisco | ios_xe | 16.12.5 | |
| cisco | ios_xe | 16.12.5a | |
| cisco | ios_xe | 16.12.5b | |
| cisco | ios_xe | 16.12.6 | |
| cisco | ios_xe | 16.12.6a | |
| cisco | ios_xe | 16.12.7 | |
| cisco | ios_xe | 16.12.8 | |
| cisco | ios_xe | 16.12.9 | |
| cisco | ios_xe | 16.12.10 | |
| cisco | ios_xe | 16.12.10a | |
| cisco | ios_xe | 16.12.11 | |
| cisco | ios_xe | 16.12.12 | |
| cisco | ios_xe | 16.12.13 | |
| cisco | ios_xe | 17.1.1 | |
| cisco | ios_xe | 17.1.1a | |
| cisco | ios_xe | 17.1.1s | |
| cisco | ios_xe | 17.1.1t | |
| cisco | ios_xe | 17.1.3 | |
| cisco | ios_xe | 17.2.1 | |
| cisco | ios_xe | 17.2.1a | |
| cisco | ios_xe | 17.2.1r | |
| cisco | ios_xe | 17.2.1v | |
| cisco | ios_xe | 17.2.2 | |
| cisco | ios_xe | 17.2.3 | |
| cisco | ios_xe | 17.3.1 | |
| cisco | ios_xe | 17.3.1a | |
| cisco | ios_xe | 17.3.1w | |
| cisco | ios_xe | 17.3.1x | |
| cisco | ios_xe | 17.3.1z | |
| cisco | ios_xe | 17.3.2 | |
| cisco | ios_xe | 17.3.2a | |
| cisco | ios_xe | 17.3.3 | |
| cisco | ios_xe | 17.3.4 | |
| cisco | ios_xe | 17.3.4a | |
| cisco | ios_xe | 17.3.4b | |
| cisco | ios_xe | 17.3.4c | |
| cisco | ios_xe | 17.3.5 | |
| cisco | ios_xe | 17.3.5a | |
| cisco | ios_xe | 17.3.5b | |
| cisco | ios_xe | 17.3.6 | |
| cisco | ios_xe | 17.3.7 | |
| cisco | ios_xe | 17.3.8 | |
| cisco | ios_xe | 17.3.8a | |
| cisco | ios_xe | 17.4.1 | |
| cisco | ios_xe | 17.4.1a | |
| cisco | ios_xe | 17.4.1b | |
| cisco | ios_xe | 17.4.2 | |
| cisco | ios_xe | 17.4.2a | |
| cisco | ios_xe | 17.5.1 | |
| cisco | ios_xe | 17.5.1a | |
| cisco | ios_xe | 17.6.1 | |
| cisco | ios_xe | 17.6.1a | |
| cisco | ios_xe | 17.6.1w | |
| cisco | ios_xe | 17.6.1x | |
| cisco | ios_xe | 17.6.1y | |
| cisco | ios_xe | 17.6.1z | |
| cisco | ios_xe | 17.6.1z1 | |
| cisco | ios_xe | 17.6.2 | |
| cisco | ios_xe | 17.6.3 | |
| cisco | ios_xe | 17.6.3a | |
| cisco | ios_xe | 17.6.4 | |
| cisco | ios_xe | 17.6.5 | |
| cisco | ios_xe | 17.6.5a | |
| cisco | ios_xe | 17.6.6 | |
| cisco | ios_xe | 17.6.6a | |
| cisco | ios_xe | 17.6.7 | |
| cisco | ios_xe | 17.6.8 | |
| cisco | ios_xe | 17.6.8a | |
| cisco | ios_xe | 17.7.1 | |
| cisco | ios_xe | 17.7.1a | |
| cisco | ios_xe | 17.7.1b | |
| cisco | ios_xe | 17.7.2 | |
| cisco | ios_xe | 17.8.1 | |
| cisco | ios_xe | 17.8.1a | |
| cisco | ios_xe | 17.9.1 | |
| cisco | ios_xe | 17.9.1a | |
| cisco | ios_xe | 17.9.1w | |
| cisco | ios_xe | 17.9.1x | |
| cisco | ios_xe | 17.9.1x1 | |
| cisco | ios_xe | 17.9.1y | |
| cisco | ios_xe | 17.9.1y1 | |
| cisco | ios_xe | 17.9.2 | |
| cisco | ios_xe | 17.9.2a | |
| cisco | ios_xe | 17.9.3 | |
| cisco | ios_xe | 17.9.3a | |
| cisco | ios_xe | 17.9.4 | |
| cisco | ios_xe | 17.9.4a | |
| cisco | ios_xe | 17.9.5 | |
| cisco | ios_xe | 17.9.5a | |
| cisco | ios_xe | 17.9.5b | |
| cisco | ios_xe | 17.9.5e | |
| cisco | ios_xe | 17.9.5f | |
| cisco | ios_xe | 17.9.6 | |
| cisco | ios_xe | 17.9.6a | |
| cisco | ios_xe | 17.9.7 | |
| cisco | ios_xe | 17.9.7a | |
| cisco | ios_xe | 17.9.7b | |
| cisco | ios_xe | 17.10.1 | |
| cisco | ios_xe | 17.10.1a | |
| cisco | ios_xe | 17.10.1b | |
| cisco | ios_xe | 17.11.1 | |
| cisco | ios_xe | 17.11.1a | |
| cisco | ios_xe | 17.12.1 | |
| cisco | ios_xe | 17.12.1a | |
| cisco | ios_xe | 17.12.1w | |
| cisco | ios_xe | 17.12.1x | |
| cisco | ios_xe | 17.12.1y | |
| cisco | ios_xe | 17.12.1z | |
| cisco | ios_xe | 17.12.1z1 | |
| cisco | ios_xe | 17.12.1z2 | |
| cisco | ios_xe | 17.12.1z3 | |
| cisco | ios_xe | 17.12.1z4 | |
| cisco | ios_xe | 17.12.2 | |
| cisco | ios_xe | 17.12.2a | |
| cisco | ios_xe | 17.12.3 | |
| cisco | ios_xe | 17.12.3a | |
| cisco | ios_xe | 17.12.4 | |
| cisco | ios_xe | 17.12.4a | |
| cisco | ios_xe | 17.12.4b | |
| cisco | ios_xe | 17.12.5 | |
| cisco | ios_xe | 17.12.5a | |
| cisco | ios_xe | 17.12.5b | |
| cisco | ios_xe | 17.12.5c | |
| cisco | ios_xe | 17.13.1 | |
| cisco | ios_xe | 17.13.1a | |
| cisco | ios_xe | 17.14.1 | |
| cisco | ios_xe | 17.14.1a | |
| cisco | ios_xe | 17.15.1 | |
| cisco | ios_xe | 17.15.1a | |
| cisco | ios_xe | 17.15.1b | |
| cisco | ios_xe | 17.15.1w | |
| cisco | ios_xe | 17.15.1x | |
| cisco | ios_xe | 17.15.1y | |
| cisco | ios_xe | 17.15.1z | |
| cisco | ios_xe | 17.15.2 | |
| cisco | ios_xe | 17.15.2a | |
| cisco | ios_xe | 17.15.2b | |
| cisco | ios_xe | 17.15.2c | |
| cisco | ios_xe | 17.15.3 | |
| cisco | ios_xe | 17.15.3a | |
| cisco | ios_xe | 17.15.3b | |
| cisco | ios_xe | 17.15.4 | |
| cisco | ios_xe | 17.16.1 | |
| cisco | ios_xe | 17.16.1a | |
| cisco | ios_xe | 17.17.1 | |
| cisco | ios_xe | 17.18.1 | |
| cisco | ios | 12.2\(33\)sxi | |
| cisco | ios | 12.2\(33\)sxi1 | |
| cisco | ios | 12.2\(33\)sxi2 | |
| cisco | ios | 12.2\(33\)sxi2a | |
| cisco | ios | 12.2\(33\)sxi3 | |
| cisco | ios | 12.2\(33\)sxi4 | |
| cisco | ios | 12.2\(33\)sxi4a | |
| cisco | ios | 12.2\(33\)sxi5 | |
| cisco | ios | 12.2\(33\)sxi6 | |
| cisco | ios | 12.2\(33\)sxi7 | |
| cisco | ios | 12.2\(33\)sxi8 | |
| cisco | ios | 12.2\(33\)sxi8a | |
| cisco | ios | 12.2\(33\)sxi9 | |
| cisco | ios | 12.2\(33\)sxi10 | |
| cisco | ios | 12.2\(33\)sxi11 | |
| cisco | ios | 12.2\(33\)sxi12 | |
| cisco | ios | 12.2\(33\)sxi13 | |
| cisco | ios | 12.2\(33\)sxi14 | |
| cisco | ios | 12.2\(33\)sxj | |
| cisco | ios | 12.2\(33\)sxj1 | |
| cisco | ios | 12.2\(33\)sxj2 | |
| cisco | ios | 12.2\(33\)sxj3 | |
| cisco | ios | 12.2\(33\)sxj4 | |
| cisco | ios | 12.2\(33\)sxj5 | |
| cisco | ios | 12.2\(33\)sxj6 | |
| cisco | ios | 12.2\(33\)sxj7 | |
| cisco | ios | 12.2\(33\)sxj8 | |
| cisco | ios | 12.2\(33\)sxj9 | |
| cisco | ios | 12.2\(33\)sxj10 | |
| cisco | ios | 12.2\(50\)sq | |
| cisco | ios | 12.2\(50\)sq1 | |
| cisco | ios | 12.2\(50\)sq2 | |
| cisco | ios | 12.2\(50\)sq3 | |
| cisco | ios | 12.2\(50\)sq4 | |
| cisco | ios | 12.2\(50\)sq5 | |
| cisco | ios | 12.2\(50\)sq6 | |
| cisco | ios | 12.2\(50\)sq7 | |
| cisco | ios | 12.2\(53\)ez | |
| cisco | ios | 12.2\(55\)ez | |
| cisco | ios | 12.2\(55\)se | |
| cisco | ios | 12.2\(55\)se1 | |
| cisco | ios | 12.2\(55\)se2 | |
| cisco | ios | 12.2\(55\)se3 | |
| cisco | ios | 12.2\(55\)se4 | |
| cisco | ios | 12.2\(55\)se5 | |
| cisco | ios | 12.2\(55\)se6 | |
| cisco | ios | 12.2\(55\)se7 | |
| cisco | ios | 12.2\(55\)se8 | |
| cisco | ios | 12.2\(55\)se9 | |
| cisco | ios | 12.2\(55\)se10 | |
| cisco | ios | 12.2\(55\)se11 | |
| cisco | ios | 12.2\(55\)se12 | |
| cisco | ios | 12.2\(55\)se13 | |
| cisco | ios | 12.2\(58\)ez | |
| cisco | ios | 12.2\(58\)se | |
| cisco | ios | 12.2\(58\)se1 | |
| cisco | ios | 12.2\(58\)se2 | |
| cisco | ios | 12.2\(60\)ez | |
| cisco | ios | 12.2\(60\)ez1 | |
| cisco | ios | 12.2\(60\)ez2 | |
| cisco | ios | 12.2\(60\)ez3 | |
| cisco | ios | 12.2\(60\)ez4 | |
| cisco | ios | 12.2\(60\)ez5 | |
| cisco | ios | 12.2\(60\)ez6 | |
| cisco | ios | 12.2\(60\)ez7 | |
| cisco | ios | 12.2\(60\)ez8 | |
| cisco | ios | 12.2\(60\)ez9 | |
| cisco | ios | 12.2\(60\)ez10 | |
| cisco | ios | 12.2\(60\)ez11 | |
| cisco | ios | 12.2\(60\)ez12 | |
| cisco | ios | 12.2\(60\)ez13 | |
| cisco | ios | 12.2\(60\)ez14 | |
| cisco | ios | 12.2\(60\)ez15 | |
| cisco | ios | 15.0\(1\)ey | |
| cisco | ios | 15.0\(1\)ey1 | |
| cisco | ios | 15.0\(1\)ey2 | |
| cisco | ios | 15.0\(1\)se | |
| cisco | ios | 15.0\(1\)se1 | |
| cisco | ios | 15.0\(1\)se2 | |
| cisco | ios | 15.0\(1\)se3 | |
| cisco | ios | 15.0\(1\)sy | |
| cisco | ios | 15.0\(1\)sy1 | |
| cisco | ios | 15.0\(1\)sy2 | |
| cisco | ios | 15.0\(1\)sy3 | |
| cisco | ios | 15.0\(1\)sy4 | |
| cisco | ios | 15.0\(1\)sy5 | |
| cisco | ios | 15.0\(1\)sy6 | |
| cisco | ios | 15.0\(1\)sy7 | |
| cisco | ios | 15.0\(1\)sy7a | |
| cisco | ios | 15.0\(1\)sy8 | |
| cisco | ios | 15.0\(1\)sy9 | |
| cisco | ios | 15.0\(1\)sy10 | |
| cisco | ios | 15.0\(2\)ea | |
| cisco | ios | 15.0\(2\)ea1 | |
| cisco | ios | 15.0\(2\)ej | |
| cisco | ios | 15.0\(2\)ej1 | |
| cisco | ios | 15.0\(2\)ek | |
| cisco | ios | 15.0\(2\)ek1 | |
| cisco | ios | 15.0\(2\)ey | |
| cisco | ios | 15.0\(2\)ey1 | |
| cisco | ios | 15.0\(2\)ey2 | |
| cisco | ios | 15.0\(2\)ey3 | |
| cisco | ios | 15.0\(2\)se | |
| cisco | ios | 15.0\(2\)se1 | |
| cisco | ios | 15.0\(2\)se2 | |
| cisco | ios | 15.0\(2\)se3 | |
| cisco | ios | 15.0\(2\)se4 | |
| cisco | ios | 15.0\(2\)se5 | |
| cisco | ios | 15.0\(2\)se6 | |
| cisco | ios | 15.0\(2\)se7 | |
| cisco | ios | 15.0\(2\)se8 | |
| cisco | ios | 15.0\(2\)se9 | |
| cisco | ios | 15.0\(2\)se10 | |
| cisco | ios | 15.0\(2\)se10a | |
| cisco | ios | 15.0\(2\)se11 | |
| cisco | ios | 15.0\(2\)se12 | |
| cisco | ios | 15.0\(2\)se13 | |
| cisco | ios | 15.0\(2\)sg | |
| cisco | ios | 15.0\(2\)sg1 | |
| cisco | ios | 15.0\(2\)sg2 | |
| cisco | ios | 15.0\(2\)sg3 | |
| cisco | ios | 15.0\(2\)sg4 | |
| cisco | ios | 15.0\(2\)sg5 | |
| cisco | ios | 15.0\(2\)sg6 | |
| cisco | ios | 15.0\(2\)sg7 | |
| cisco | ios | 15.0\(2\)sg8 | |
| cisco | ios | 15.0\(2\)sg9 | |
| cisco | ios | 15.0\(2\)sg10 | |
| cisco | ios | 15.0\(2\)sg11 | |
| cisco | ios | 15.0\(2\)sqd | |
| cisco | ios | 15.0\(2\)sqd1 | |
| cisco | ios | 15.0\(2\)sqd2 | |
| cisco | ios | 15.0\(2\)sqd3 | |
| cisco | ios | 15.0\(2\)sqd4 | |
| cisco | ios | 15.0\(2\)sqd5 | |
| cisco | ios | 15.0\(2\)sqd6 | |
| cisco | ios | 15.0\(2\)sqd7 | |
| cisco | ios | 15.0\(2\)sqd8 | |
| cisco | ios | 15.1\(1\)sg | |
| cisco | ios | 15.1\(1\)sg1 | |
| cisco | ios | 15.1\(1\)sg2 | |
| cisco | ios | 15.1\(1\)sy | |
| cisco | ios | 15.1\(1\)sy1 | |
| cisco | ios | 15.1\(1\)sy2 | |
| cisco | ios | 15.1\(1\)sy3 | |
| cisco | ios | 15.1\(1\)sy4 | |
| cisco | ios | 15.1\(1\)sy5 | |
| cisco | ios | 15.1\(1\)sy6 | |
| cisco | ios | 15.1\(2\)sg | |
| cisco | ios | 15.1\(2\)sg1 | |
| cisco | ios | 15.1\(2\)sg2 | |
| cisco | ios | 15.1\(2\)sg3 | |
| cisco | ios | 15.1\(2\)sg4 | |
| cisco | ios | 15.1\(2\)sg5 | |
| cisco | ios | 15.1\(2\)sg6 | |
| cisco | ios | 15.1\(2\)sg7 | |
| cisco | ios | 15.1\(2\)sg8 | |
| cisco | ios | 15.1\(2\)sy | |
| cisco | ios | 15.1\(2\)sy1 | |
| cisco | ios | 15.1\(2\)sy2 | |
| cisco | ios | 15.1\(2\)sy3 | |
| cisco | ios | 15.1\(2\)sy4 | |
| cisco | ios | 15.1\(2\)sy4a | |
| cisco | ios | 15.1\(2\)sy5 | |
| cisco | ios | 15.1\(2\)sy6 | |
| cisco | ios | 15.1\(2\)sy7 | |
| cisco | ios | 15.1\(2\)sy8 | |
| cisco | ios | 15.1\(2\)sy9 | |
| cisco | ios | 15.1\(2\)sy10 | |
| cisco | ios | 15.1\(2\)sy11 | |
| cisco | ios | 15.1\(2\)sy12 | |
| cisco | ios | 15.1\(2\)sy13 | |
| cisco | ios | 15.1\(2\)sy14 | |
| cisco | ios | 15.1\(2\)sy15 | |
| cisco | ios | 15.1\(2\)sy16 | |
| cisco | ios | 15.2\(1\)e | |
| cisco | ios | 15.2\(1\)e1 | |
| cisco | ios | 15.2\(1\)e2 | |
| cisco | ios | 15.2\(1\)e3 | |
| cisco | ios | 15.2\(1\)ey | |
| cisco | ios | 15.2\(1\)sy | |
| cisco | ios | 15.2\(1\)sy0a | |
| cisco | ios | 15.2\(1\)sy1 | |
| cisco | ios | 15.2\(1\)sy1a | |
| cisco | ios | 15.2\(1\)sy2 | |
| cisco | ios | 15.2\(1\)sy3 | |
| cisco | ios | 15.2\(1\)sy4 | |
| cisco | ios | 15.2\(1\)sy5 | |
| cisco | ios | 15.2\(1\)sy6 | |
| cisco | ios | 15.2\(1\)sy7 | |
| cisco | ios | 15.2\(1\)sy8 | |
| cisco | ios | 15.2\(2\)e | |
| cisco | ios | 15.2\(2\)e1 | |
| cisco | ios | 15.2\(2\)e2 | |
| cisco | ios | 15.2\(2\)e3 | |
| cisco | ios | 15.2\(2\)e4 | |
| cisco | ios | 15.2\(2\)e5 | |
| cisco | ios | 15.2\(2\)e5a | |
| cisco | ios | 15.2\(2\)e5b | |
| cisco | ios | 15.2\(2\)e6 | |
| cisco | ios | 15.2\(2\)e7 | |
| cisco | ios | 15.2\(2\)e8 | |
| cisco | ios | 15.2\(2\)e9 | |
| cisco | ios | 15.2\(2\)e10 | |
| cisco | ios | 15.2\(2\)ea | |
| cisco | ios | 15.2\(2\)ea1 | |
| cisco | ios | 15.2\(2\)ea2 | |
| cisco | ios | 15.2\(2\)ea3 | |
| cisco | ios | 15.2\(2\)gc | |
| cisco | ios | 15.2\(2\)jax | |
| cisco | ios | 15.2\(2\)jb | |
| cisco | ios | 15.2\(2\)jb2 | |
| cisco | ios | 15.2\(2\)jb3 | |
| cisco | ios | 15.2\(2\)jb4 | |
| cisco | ios | 15.2\(2\)jb5 | |
| cisco | ios | 15.2\(2\)jb6 | |
| cisco | ios | 15.2\(2\)sy | |
| cisco | ios | 15.2\(2\)sy1 | |
| cisco | ios | 15.2\(2\)sy2 | |
| cisco | ios | 15.2\(2\)sy3 | |
| cisco | ios | 15.2\(2a\)e1 | |
| cisco | ios | 15.2\(2a\)e2 | |
| cisco | ios | 15.2\(3\)e | |
| cisco | ios | 15.2\(3\)e1 | |
| cisco | ios | 15.2\(3\)e2 | |
| cisco | ios | 15.2\(3\)e3 | |
| cisco | ios | 15.2\(3\)e4 | |
| cisco | ios | 15.2\(3\)ea | |
| cisco | ios | 15.2\(3\)gc | |
| cisco | ios | 15.2\(3\)gc1 | |
| cisco | ios | 15.2\(3a\)e | |
| cisco | ios | 15.2\(4\)e | |
| cisco | ios | 15.2\(4\)e1 | |
| cisco | ios | 15.2\(4\)e2 | |
| cisco | ios | 15.2\(4\)e3 | |
| cisco | ios | 15.2\(4\)e4 | |
| cisco | ios | 15.2\(4\)e5 | |
| cisco | ios | 15.2\(4\)e6 | |
| cisco | ios | 15.2\(4\)e7 | |
| cisco | ios | 15.2\(4\)e8 | |
| cisco | ios | 15.2\(4\)e9 | |
| cisco | ios | 15.2\(4\)e10 | |
| cisco | ios | 15.2\(4\)e10a | |
| cisco | ios | 15.2\(4\)e10d | |
| cisco | ios | 15.2\(4\)ea | |
| cisco | ios | 15.2\(4\)ea1 | |
| cisco | ios | 15.2\(4\)ea3 | |
| cisco | ios | 15.2\(4\)ea4 | |
| cisco | ios | 15.2\(4\)ea5 | |
| cisco | ios | 15.2\(4\)ea6 | |
| cisco | ios | 15.2\(4\)ea7 | |
| cisco | ios | 15.2\(4\)ea8 | |
| cisco | ios | 15.2\(4\)ea9 | |
| cisco | ios | 15.2\(4\)ea9a | |
| cisco | ios | 15.2\(4\)ec1 | |
| cisco | ios | 15.2\(4\)ec2 | |
| cisco | ios | 15.2\(4\)gc | |
| cisco | ios | 15.2\(4\)gc1 | |
| cisco | ios | 15.2\(4\)gc2 | |
| cisco | ios | 15.2\(4\)gc3 | |
| cisco | ios | 15.2\(4\)jb | |
| cisco | ios | 15.2\(4\)jb1 | |
| cisco | ios | 15.2\(4\)jb2 | |
| cisco | ios | 15.2\(4\)jb3 | |
| cisco | ios | 15.2\(4\)jb3a | |
| cisco | ios | 15.2\(4\)jb3b | |
| cisco | ios | 15.2\(4\)jb3h | |
| cisco | ios | 15.2\(4\)jb4 | |
| cisco | ios | 15.2\(4\)jb5 | |
| cisco | ios | 15.2\(4\)jb6 | |
| cisco | ios | 15.2\(4\)jn | |
| cisco | ios | 15.2\(4\)m | |
| cisco | ios | 15.2\(4\)m1 | |
| cisco | ios | 15.2\(4\)m2 | |
| cisco | ios | 15.2\(4\)m3 | |
| cisco | ios | 15.2\(4\)m4 | |
| cisco | ios | 15.2\(4\)m5 | |
| cisco | ios | 15.2\(4\)m6 | |
| cisco | ios | 15.2\(4\)m6a | |
| cisco | ios | 15.2\(4\)m7 | |
| cisco | ios | 15.2\(4\)m8 | |
| cisco | ios | 15.2\(4\)m9 | |
| cisco | ios | 15.2\(4\)m10 | |
| cisco | ios | 15.2\(4\)m11 | |
| cisco | ios | 15.2\(5\)e | |
| cisco | ios | 15.2\(5\)e1 | |
| cisco | ios | 15.2\(5\)e2 | |
| cisco | ios | 15.2\(5\)e2c | |
| cisco | ios | 15.2\(5\)ea | |
| cisco | ios | 15.2\(5\)ex | |
| cisco | ios | 15.2\(5a\)e | |
| cisco | ios | 15.2\(5a\)e1 | |
| cisco | ios | 15.2\(5b\)e | |
| cisco | ios | 15.2\(5c\)e | |
| cisco | ios | 15.2\(6\)e | |
| cisco | ios | 15.2\(6\)e0a | |
| cisco | ios | 15.2\(6\)e0c | |
| cisco | ios | 15.2\(6\)e1 | |
| cisco | ios | 15.2\(6\)e2 | |
| cisco | ios | 15.2\(6\)e2a | |
| cisco | ios | 15.2\(6\)e2b | |
| cisco | ios | 15.2\(6\)e3 | |
| cisco | ios | 15.2\(7\)e | |
| cisco | ios | 15.2\(7\)e0a | |
| cisco | ios | 15.2\(7\)e0b | |
| cisco | ios | 15.2\(7\)e0s | |
| cisco | ios | 15.2\(7\)e1 | |
| cisco | ios | 15.2\(7\)e1a | |
| cisco | ios | 15.2\(7\)e2 | |
| cisco | ios | 15.2\(7\)e2a | |
| cisco | ios | 15.2\(7\)e3 | |
| cisco | ios | 15.2\(7\)e3k | |
| cisco | ios | 15.2\(7\)e4 | |
| cisco | ios | 15.2\(7\)e5 | |
| cisco | ios | 15.2\(7\)e6 | |
| cisco | ios | 15.2\(7\)e7 | |
| cisco | ios | 15.2\(7\)e8 | |
| cisco | ios | 15.2\(7\)e9 | |
| cisco | ios | 15.2\(7\)e10 | |
| cisco | ios | 15.2\(7\)e11 | |
| cisco | ios | 15.2\(7\)e12 | |
| cisco | ios | 15.2\(7a\)e0b | |
| cisco | ios | 15.2\(7b\)e0b | |
| cisco | ios | 15.2\(8\)e | |
| cisco | ios | 15.2\(8\)e1 | |
| cisco | ios | 15.2\(8\)e2 | |
| cisco | ios | 15.2\(8\)e3 | |
| cisco | ios | 15.2\(8\)e4 | |
| cisco | ios | 15.2\(8\)e5 | |
| cisco | ios | 15.2\(8\)e6 | |
| cisco | ios | 15.2\(8\)e7 | |
| cisco | ios | 15.3\(1\)sy | |
| cisco | ios | 15.3\(1\)sy1 | |
| cisco | ios | 15.3\(1\)sy2 | |
| cisco | ios | 15.3\(1\)t | |
| cisco | ios | 15.3\(1\)t1 | |
| cisco | ios | 15.3\(1\)t2 | |
| cisco | ios | 15.3\(1\)t3 | |
| cisco | ios | 15.3\(1\)t4 | |
| cisco | ios | 15.3\(2\)t | |
| cisco | ios | 15.3\(2\)t1 | |
| cisco | ios | 15.3\(2\)t2 | |
| cisco | ios | 15.3\(2\)t3 | |
| cisco | ios | 15.3\(2\)t4 | |
| cisco | ios | 15.3\(3\)ja1 | |
| cisco | ios | 15.3\(3\)ja1m | |
| cisco | ios | 15.3\(3\)ja4 | |
| cisco | ios | 15.3\(3\)ja5 | |
| cisco | ios | 15.3\(3\)ja6 | |
| cisco | ios | 15.3\(3\)ja7 | |
| cisco | ios | 15.3\(3\)ja8 | |
| cisco | ios | 15.3\(3\)ja10 | |
| cisco | ios | 15.3\(3\)ja11 | |
| cisco | ios | 15.3\(3\)ja12 | |
| cisco | ios | 15.3\(3\)jaa | |
| cisco | ios | 15.3\(3\)jaa11 | |
| cisco | ios | 15.3\(3\)jaa12 | |
| cisco | ios | 15.3\(3\)jab | |
| cisco | ios | 15.3\(3\)jax | |
| cisco | ios | 15.3\(3\)jax1 | |
| cisco | ios | 15.3\(3\)jax2 | |
| cisco | ios | 15.3\(3\)jb | |
| cisco | ios | 15.3\(3\)jbb | |
| cisco | ios | 15.3\(3\)jbb1 | |
| cisco | ios | 15.3\(3\)jbb2 | |
| cisco | ios | 15.3\(3\)jbb4 | |
| cisco | ios | 15.3\(3\)jbb5 | |
| cisco | ios | 15.3\(3\)jbb6 | |
| cisco | ios | 15.3\(3\)jbb6a | |
| cisco | ios | 15.3\(3\)jbb8 | |
| cisco | ios | 15.3\(3\)jc | |
| cisco | ios | 15.3\(3\)jc1 | |
| cisco | ios | 15.3\(3\)jc2 | |
| cisco | ios | 15.3\(3\)jc3 | |
| cisco | ios | 15.3\(3\)jc4 | |
| cisco | ios | 15.3\(3\)jc5 | |
| cisco | ios | 15.3\(3\)jc6 | |
| cisco | ios | 15.3\(3\)jc8 | |
| cisco | ios | 15.3\(3\)jc9 | |
| cisco | ios | 15.3\(3\)jc14 | |
| cisco | ios | 15.3\(3\)jca7 | |
| cisco | ios | 15.3\(3\)jca8 | |
| cisco | ios | 15.3\(3\)jca9 | |
| cisco | ios | 15.3\(3\)jd | |
| cisco | ios | 15.3\(3\)jd2 | |
| cisco | ios | 15.3\(3\)jd3 | |
| cisco | ios | 15.3\(3\)jd4 | |
| cisco | ios | 15.3\(3\)jd5 | |
| cisco | ios | 15.3\(3\)jd6 | |
| cisco | ios | 15.3\(3\)jd7 | |
| cisco | ios | 15.3\(3\)jd8 | |
| cisco | ios | 15.3\(3\)jd9 | |
| cisco | ios | 15.3\(3\)jd11 | |
| cisco | ios | 15.3\(3\)jd13 | |
| cisco | ios | 15.3\(3\)jd14 | |
| cisco | ios | 15.3\(3\)jd16 | |
| cisco | ios | 15.3\(3\)jd17 | |
| cisco | ios | 15.3\(3\)jda7 | |
| cisco | ios | 15.3\(3\)jda8 | |
| cisco | ios | 15.3\(3\)jda9 | |
| cisco | ios | 15.3\(3\)jda11 | |
| cisco | ios | 15.3\(3\)jda13 | |
| cisco | ios | 15.3\(3\)jda14 | |
| cisco | ios | 15.3\(3\)jda16 | |
| cisco | ios | 15.3\(3\)jda17 | |
| cisco | ios | 15.3\(3\)je | |
| cisco | ios | 15.3\(3\)jf | |
| cisco | ios | 15.3\(3\)jf1 | |
| cisco | ios | 15.3\(3\)jf2 | |
| cisco | ios | 15.3\(3\)jf4 | |
| cisco | ios | 15.3\(3\)jf5 | |
| cisco | ios | 15.3\(3\)jf6 | |
| cisco | ios | 15.3\(3\)jf7 | |
| cisco | ios | 15.3\(3\)jf8 | |
| cisco | ios | 15.3\(3\)jf9 | |
| cisco | ios | 15.3\(3\)jf10 | |
| cisco | ios | 15.3\(3\)jf11 | |
| cisco | ios | 15.3\(3\)jf12 | |
| cisco | ios | 15.3\(3\)jf12i | |
| cisco | ios | 15.3\(3\)jf14 | |
| cisco | ios | 15.3\(3\)jf14i | |
| cisco | ios | 15.3\(3\)jf15 | |
| cisco | ios | 15.3\(3\)jg | |
| cisco | ios | 15.3\(3\)jg1 | |
| cisco | ios | 15.3\(3\)jh | |
| cisco | ios | 15.3\(3\)jh1 | |
| cisco | ios | 15.3\(3\)ji1 | |
| cisco | ios | 15.3\(3\)ji3 | |
| cisco | ios | 15.3\(3\)ji4 | |
| cisco | ios | 15.3\(3\)ji5 | |
| cisco | ios | 15.3\(3\)ji6 | |
| cisco | ios | 15.3\(3\)jj | |
| cisco | ios | 15.3\(3\)jj1 | |
| cisco | ios | 15.3\(3\)jk | |
| cisco | ios | 15.3\(3\)jk1 | |
| cisco | ios | 15.3\(3\)jk1t | |
| cisco | ios | 15.3\(3\)jk2 | |
| cisco | ios | 15.3\(3\)jk2a | |
| cisco | ios | 15.3\(3\)jk3 | |
| cisco | ios | 15.3\(3\)jk4 | |
| cisco | ios | 15.3\(3\)jk5 | |
| cisco | ios | 15.3\(3\)jk6 | |
| cisco | ios | 15.3\(3\)jk7 | |
| cisco | ios | 15.3\(3\)jk8 | |
| cisco | ios | 15.3\(3\)jk8a | |
| cisco | ios | 15.3\(3\)jk8b | |
| cisco | ios | 15.3\(3\)jk9 | |
| cisco | ios | 15.3\(3\)jk10 | |
| cisco | ios | 15.3\(3\)jk11 | |
| cisco | ios | 15.3\(3\)jn3 | |
| cisco | ios | 15.3\(3\)jn4 | |
| cisco | ios | 15.3\(3\)jn7 | |
| cisco | ios | 15.3\(3\)jn8 | |
| cisco | ios | 15.3\(3\)jn9 | |
| cisco | ios | 15.3\(3\)jnb | |
| cisco | ios | 15.3\(3\)jnb1 | |
| cisco | ios | 15.3\(3\)jnb2 | |
| cisco | ios | 15.3\(3\)jnb3 | |
| cisco | ios | 15.3\(3\)jnb4 | |
| cisco | ios | 15.3\(3\)jnb5 | |
| cisco | ios | 15.3\(3\)jnb6 | |
| cisco | ios | 15.3\(3\)jnc | |
| cisco | ios | 15.3\(3\)jnc1 | |
| cisco | ios | 15.3\(3\)jnc4 | |
| cisco | ios | 15.3\(3\)jnd | |
| cisco | ios | 15.3\(3\)jnd1 | |
| cisco | ios | 15.3\(3\)jnd2 | |
| cisco | ios | 15.3\(3\)jnd3 | |
| cisco | ios | 15.3\(3\)jnp | |
| cisco | ios | 15.3\(3\)jnp1 | |
| cisco | ios | 15.3\(3\)jnp3 | |
| cisco | ios | 15.3\(3\)jpb | |
| cisco | ios | 15.3\(3\)jpb1 | |
| cisco | ios | 15.3\(3\)jpc | |
| cisco | ios | 15.3\(3\)jpc1 | |
| cisco | ios | 15.3\(3\)jpc2 | |
| cisco | ios | 15.3\(3\)jpc3 | |
| cisco | ios | 15.3\(3\)jpc5 | |
| cisco | ios | 15.3\(3\)jpd | |
| cisco | ios | 15.3\(3\)jpi1 | |
| cisco | ios | 15.3\(3\)jpi1t | |
| cisco | ios | 15.3\(3\)jpi4 | |
| cisco | ios | 15.3\(3\)jpi5 | |
| cisco | ios | 15.3\(3\)jpi6a | |
| cisco | ios | 15.3\(3\)jpi7 | |
| cisco | ios | 15.3\(3\)jpi8a | |
| cisco | ios | 15.3\(3\)jpi9 | |
| cisco | ios | 15.3\(3\)jpi10 | |
| cisco | ios | 15.3\(3\)jpj2 | |
| cisco | ios | 15.3\(3\)jpj2t | |
| cisco | ios | 15.3\(3\)jpj3 | |
| cisco | ios | 15.3\(3\)jpj3a | |
| cisco | ios | 15.3\(3\)jpj4 | |
| cisco | ios | 15.3\(3\)jpj5 | |
| cisco | ios | 15.3\(3\)jpj6 | |
| cisco | ios | 15.3\(3\)jpj7 | |
| cisco | ios | 15.3\(3\)jpj7c | |
| cisco | ios | 15.3\(3\)jpj8a | |
| cisco | ios | 15.3\(3\)jpj9 | |
| cisco | ios | 15.3\(3\)jpj10 | |
| cisco | ios | 15.3\(3\)jpj11 | |
| cisco | ios | 15.3\(3\)jpk | |
| cisco | ios | 15.3\(3\)jpk1 | |
| cisco | ios | 15.3\(3\)jpk2 | |
| cisco | ios | 15.3\(3\)jpk3 | |
| cisco | ios | 15.3\(3\)jpk4 | |
| cisco | ios | 15.3\(3\)jpk5 | |
| cisco | ios | 15.3\(3\)jpk6 | |
| cisco | ios | 15.3\(3\)jpk7 | |
| cisco | ios | 15.3\(3\)jpk8 | |
| cisco | ios | 15.3\(3\)jpk9 | |
| cisco | ios | 15.3\(3\)jpl | |
| cisco | ios | 15.3\(3\)jpm | |
| cisco | ios | 15.3\(3\)jpn | |
| cisco | ios | 15.3\(3\)jpn1 | |
| cisco | ios | 15.3\(3\)jpn2 | |
| cisco | ios | 15.3\(3\)jpn3 | |
| cisco | ios | 15.3\(3\)jpn4 | |
| cisco | ios | 15.3\(3\)jpn5 | |
| cisco | ios | 15.3\(3\)jpn6 | |
| cisco | ios | 15.3\(3\)jpo | |
| cisco | ios | 15.3\(3\)jpp | |
| cisco | ios | 15.3\(3\)jpq | |
| cisco | ios | 15.3\(3\)jpq1 | |
| cisco | ios | 15.3\(3\)jpq2 | |
| cisco | ios | 15.3\(3\)jpq3 | |
| cisco | ios | 15.3\(3\)jpq4 | |
| cisco | ios | 15.3\(3\)jpq5 | |
| cisco | ios | 15.3\(3\)jpr | |
| cisco | ios | 15.3\(3\)jps | |
| cisco | ios | 15.3\(3\)jpt | |
| cisco | ios | 15.3\(3\)jpt1 | |
| cisco | ios | 15.3\(3\)jpt2 | |
| cisco | ios | 15.3\(3\)m | |
| cisco | ios | 15.3\(3\)m1 | |
| cisco | ios | 15.3\(3\)m2 | |
| cisco | ios | 15.3\(3\)m3 | |
| cisco | ios | 15.3\(3\)m4 | |
| cisco | ios | 15.3\(3\)m5 | |
| cisco | ios | 15.3\(3\)m6 | |
| cisco | ios | 15.3\(3\)m7 | |
| cisco | ios | 15.3\(3\)m8 | |
| cisco | ios | 15.3\(3\)m8a | |
| cisco | ios | 15.3\(3\)m9 | |
| cisco | ios | 15.3\(3\)m10 | |
| cisco | ios | 15.4\(1\)cg | |
| cisco | ios | 15.4\(1\)cg1 | |
| cisco | ios | 15.4\(1\)sy | |
| cisco | ios | 15.4\(1\)sy1 | |
| cisco | ios | 15.4\(1\)sy2 | |
| cisco | ios | 15.4\(1\)sy3 | |
| cisco | ios | 15.4\(1\)sy4 | |
| cisco | ios | 15.4\(1\)t | |
| cisco | ios | 15.4\(1\)t1 | |
| cisco | ios | 15.4\(1\)t2 | |
| cisco | ios | 15.4\(1\)t3 | |
| cisco | ios | 15.4\(1\)t4 | |
| cisco | ios | 15.4\(2\)cg | |
| cisco | ios | 15.4\(2\)t | |
| cisco | ios | 15.4\(2\)t1 | |
| cisco | ios | 15.4\(2\)t2 | |
| cisco | ios | 15.4\(2\)t3 | |
| cisco | ios | 15.4\(2\)t4 | |
| cisco | ios | 15.5\(1\)s | |
| cisco | ios | 15.5\(1\)s1 | |
| cisco | ios | 15.5\(1\)s2 | |
| cisco | ios | 15.5\(1\)s3 | |
| cisco | ios | 15.5\(1\)s4 | |
| cisco | ios | 15.5\(1\)sy | |
| cisco | ios | 15.5\(1\)sy1 | |
| cisco | ios | 15.5\(1\)sy2 | |
| cisco | ios | 15.5\(1\)sy3 | |
| cisco | ios | 15.5\(1\)sy4 | |
| cisco | ios | 15.5\(1\)sy5 | |
| cisco | ios | 15.5\(1\)sy6 | |
| cisco | ios | 15.5\(1\)sy7 | |
| cisco | ios | 15.5\(1\)sy8 | |
| cisco | ios | 15.5\(1\)sy9 | |
| cisco | ios | 15.5\(1\)sy10 | |
| cisco | ios | 15.5\(1\)sy11 | |
| cisco | ios | 15.5\(1\)sy12 | |
| cisco | ios | 15.5\(1\)sy13 | |
| cisco | ios | 15.5\(1\)sy14 | |
| cisco | ios | 15.5\(1\)sy15 | |
| cisco | ios | 15.5\(1\)t | |
| cisco | ios | 15.5\(1\)t1 | |
| cisco | ios | 15.5\(1\)t2 | |
| cisco | ios | 15.5\(1\)t3 | |
| cisco | ios | 15.5\(1\)t4 | |
| cisco | ios | 15.5\(2\)s | |
| cisco | ios | 15.5\(2\)s1 | |
| cisco | ios | 15.5\(2\)s2 | |
| cisco | ios | 15.5\(2\)s3 | |
| cisco | ios | 15.5\(2\)s4 | |
| cisco | ios | 15.5\(2\)t | |
| cisco | ios | 15.5\(2\)t1 | |
| cisco | ios | 15.5\(2\)t2 | |
| cisco | ios | 15.5\(2\)t3 | |
| cisco | ios | 15.5\(2\)t4 | |
| cisco | ios | 15.5\(3\)m | |
| cisco | ios | 15.5\(3\)m0a | |
| cisco | ios | 15.5\(3\)m1 | |
| cisco | ios | 15.5\(3\)m2 | |
| cisco | ios | 15.5\(3\)m3 | |
| cisco | ios | 15.5\(3\)m4 | |
| cisco | ios | 15.5\(3\)m4a | |
| cisco | ios | 15.5\(3\)m5 | |
| cisco | ios | 15.5\(3\)m6 | |
| cisco | ios | 15.5\(3\)m6a | |
| cisco | ios | 15.5\(3\)m7 | |
| cisco | ios | 15.5\(3\)m8 | |
| cisco | ios | 15.5\(3\)m9 | |
| cisco | ios | 15.5\(3\)m10 | |
| cisco | ios | 15.5\(3\)s | |
| cisco | ios | 15.5\(3\)s0a | |
| cisco | ios | 15.5\(3\)s1 | |
| cisco | ios | 15.5\(3\)s1a | |
| cisco | ios | 15.5\(3\)s2 | |
| cisco | ios | 15.5\(3\)s3 | |
| cisco | ios | 15.5\(3\)s4 | |
| cisco | ios | 15.5\(3\)s5 | |
| cisco | ios | 15.5\(3\)s6 | |
| cisco | ios | 15.5\(3\)s6a | |
| cisco | ios | 15.5\(3\)s6b | |
| cisco | ios | 15.5\(3\)s7 | |
| cisco | ios | 15.5\(3\)s8 | |
| cisco | ios | 15.5\(3\)s9 | |
| cisco | ios | 15.5\(3\)s9a | |
| cisco | ios | 15.5\(3\)s10 | |
| cisco | ios | 15.5\(3\)sn | |
| cisco | ios | 15.6\(1\)s | |
| cisco | ios | 15.6\(1\)s1 | |
| cisco | ios | 15.6\(1\)s2 | |
| cisco | ios | 15.6\(1\)s3 | |
| cisco | ios | 15.6\(1\)s4 | |
| cisco | ios | 15.6\(1\)t | |
| cisco | ios | 15.6\(1\)t0a | |
| cisco | ios | 15.6\(1\)t1 | |
| cisco | ios | 15.6\(1\)t2 | |
| cisco | ios | 15.6\(1\)t3 | |
| cisco | ios | 15.6\(2\)s | |
| cisco | ios | 15.6\(2\)s1 | |
| cisco | ios | 15.6\(2\)s2 | |
| cisco | ios | 15.6\(2\)s3 | |
| cisco | ios | 15.6\(2\)s4 | |
| cisco | ios | 15.6\(2\)sn | |
| cisco | ios | 15.6\(2\)sp | |
| cisco | ios | 15.6\(2\)sp1 | |
| cisco | ios | 15.6\(2\)sp2 | |
| cisco | ios | 15.6\(2\)sp3 | |
| cisco | ios | 15.6\(2\)sp4 | |
| cisco | ios | 15.6\(2\)sp5 | |
| cisco | ios | 15.6\(2\)sp6 | |
| cisco | ios | 15.6\(2\)sp7 | |
| cisco | ios | 15.6\(2\)sp8 | |
| cisco | ios | 15.6\(2\)sp9 | |
| cisco | ios | 15.6\(2\)t | |
| cisco | ios | 15.6\(2\)t1 | |
| cisco | ios | 15.6\(2\)t2 | |
| cisco | ios | 15.6\(2\)t3 | |
| cisco | ios | 15.6\(3\)m | |
| cisco | ios | 15.6\(3\)m0a | |
| cisco | ios | 15.6\(3\)m1 | |
| cisco | ios | 15.6\(3\)m1b | |
| cisco | ios | 15.6\(3\)m2 | |
| cisco | ios | 15.6\(3\)m2a | |
| cisco | ios | 15.6\(3\)m3 | |
| cisco | ios | 15.6\(3\)m3a | |
| cisco | ios | 15.6\(3\)m4 | |
| cisco | ios | 15.6\(3\)m5 | |
| cisco | ios | 15.6\(3\)m6 | |
| cisco | ios | 15.6\(3\)m6a | |
| cisco | ios | 15.6\(3\)m6b | |
| cisco | ios | 15.6\(3\)m7 | |
| cisco | ios | 15.6\(3\)m8 | |
| cisco | ios | 15.6\(3\)m9 | |
| cisco | ios | 15.7\(3\)m | |
| cisco | ios | 15.7\(3\)m0a | |
| cisco | ios | 15.7\(3\)m1 | |
| cisco | ios | 15.7\(3\)m2 | |
| cisco | ios | 15.7\(3\)m3 | |
| cisco | ios | 15.7\(3\)m4 | |
| cisco | ios | 15.7\(3\)m4a | |
| cisco | ios | 15.7\(3\)m4b | |
| cisco | ios | 15.7\(3\)m5 | |
| cisco | ios | 15.7\(3\)m6 | |
| cisco | ios | 15.7\(3\)m7 | |
| cisco | ios | 15.7\(3\)m8 | |
| cisco | ios | 15.7\(3\)m9 | |
| cisco | ios | 15.8\(3\)m | |
| cisco | ios | 15.8\(3\)m0a | |
| cisco | ios | 15.8\(3\)m0b | |
| cisco | ios | 15.8\(3\)m1 | |
| cisco | ios | 15.8\(3\)m1a | |
| cisco | ios | 15.8\(3\)m2 | |
| cisco | ios | 15.8\(3\)m2a | |
| cisco | ios | 15.8\(3\)m3 | |
| cisco | ios | 15.8\(3\)m3a | |
| cisco | ios | 15.8\(3\)m3b | |
| cisco | ios | 15.8\(3\)m4 | |
| cisco | ios | 15.8\(3\)m5 | |
| cisco | ios | 15.8\(3\)m6 | |
| cisco | ios | 15.8\(3\)m7 | |
| cisco | ios | 15.8\(3\)m8 | |
| cisco | ios | 15.8\(3\)m9 | |
| cisco | ios | 15.9\(3\)m | |
| cisco | ios | 15.9\(3\)m0a | |
| cisco | ios | 15.9\(3\)m1 | |
| cisco | ios | 15.9\(3\)m2 | |
| cisco | ios | 15.9\(3\)m2a | |
| cisco | ios | 15.9\(3\)m3 | |
| cisco | ios | 15.9\(3\)m3a | |
| cisco | ios | 15.9\(3\)m3b | |
| cisco | ios | 15.9\(3\)m4 | |
| cisco | ios | 15.9\(3\)m4a | |
| cisco | ios | 15.9\(3\)m5 | |
| cisco | ios | 15.9\(3\)m6 | |
| cisco | ios | 15.9\(3\)m6a | |
| cisco | ios | 15.9\(3\)m6b | |
| cisco | ios | 15.9\(3\)m7 | |
| cisco | ios | 15.9\(3\)m7a | |
| cisco | ios | 15.9\(3\)m8 | |
| cisco | ios | 15.9\(3\)m8b | |
| cisco | ios | 15.9\(3\)m9 | |
| cisco | ios | 15.9\(3\)m10 | |
| cisco | ios | 15.9\(3\)m11 |
{
"cisaActionDue": "2025-10-20",
"cisaExploitAdd": "2025-09-29",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3A45A569-C122-4474-BE14-AF7BA71736BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC516F4-F6DD-460D-BBC4-DD32CC0F1180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD04C1FB-F8F8-486A-9E2F-EB01856B1C5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "156D51A0-506C-47FD-BF45-955C1B881976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "23468BBF-F5AB-4924-A084-F065BB02BF22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A03544C9-6037-4D88-8D0E-513DFCB4CC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B681843-64AE-4987-B94A-DD9A915846CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "C022D72E-D7E5-4910-8D0A-D488348D10D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "3F49E6EE-95D6-4419-BDC7-274F30C53886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7B56C494-9925-46DE-B1FA-3D1C46093F67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BA375C35-61CC-4123-967C-1E4B40673D73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C32EAF-90A1-4391-B82D-A1F8E6A83E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA58A8E-D63E-4276-BB92-35B7F4D2760E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "54C51F43-FDA7-4F87-9EA7-3049E6EA17B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "36994E4F-2207-4CD6-8605-9A7D641AC769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF6B43E-2EB9-4D74-8C92-6D5AFDFECF01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.2r:*:*:*:*:*:*:*",
"matchCriteriaId": "7050DADE-B994-4A5E-A093-EAB6FEF0B3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85FE74B7-E21A-4E99-BD60-37BC4C10BD94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A81BD856-D376-46EA-9C6E-48DA6C5EA47F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "EE89B334-1927-4359-9CA6-9EFF4A247949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "89E31772-E8D3-4BC8-B337-B33BCAC4C750",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCF5A7C-202D-44F8-97D3-694F876050D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EA559D-5184-4E19-8A32-ECA41C930AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"matchCriteriaId": "716D8805-D461-4066-9BFD-1EA895E4B997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"matchCriteriaId": "7150819E-EFB5-4224-975C-84EDBBB2881D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E81F4068-35A1-4712-9B88-F6E574B2DE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"matchCriteriaId": "28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"matchCriteriaId": "29794A8C-B1CC-492F-9A68-02EEE994743B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBBDA12-AF2E-400B-979D-3657F1F2C15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7F55DC-38F5-4B19-A699-90E1D302A04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.12e:*:*:*:*:*:*:*",
"matchCriteriaId": "334B45D5-14FE-4FB1-9A06-553B7E860D09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82E2A28A-700E-4546-AA94-2B13C925BDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DB62FB56-A09A-4BE3-AF4C-180903078C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7a:*:*:*:*:*:*:*",
"matchCriteriaId": "0627B380-B8E7-4BA4-BC1B-ADBCC3A6018B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7b:*:*:*:*:*:*:*",
"matchCriteriaId": "03F75200-396B-43BB-A529-9A3A45B9EBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E147E53-B047-429F-9E3B-04FB5F777B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z3:*:*:*:*:*:*:*",
"matchCriteriaId": "0656EA0A-3BB6-49AD-A6BB-922C2BC5B075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EDBECC5-25B6-461F-BE21-F4EA569DAEA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "99810E61-9C5F-4B26-8DFD-75C971593386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "B25CC70F-42ED-42EF-8CC6-50FF1F809F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "DB60F2D0-B9D2-42A8-85EC-433BCE5BEC24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5c:*:*:*:*:*:*:*",
"matchCriteriaId": "FB757B3D-14A1-4997-AA51-9870FD81763C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F9C74B-113E-4808-B979-7738E3A52B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1C482977-8384-4A57-B251-39BC01E4F7EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "B4CC3DA6-7A3D-4AFB-958A-E047D896CDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A18E50D1-BAF5-4C0F-9253-774089BAA2EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDCA684-FF44-49EB-93B5-ED6778E437BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0FD5B7-69E7-43CB-A658-E05557AC2D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBDBD9B-7122-413B-8671-17AEBE56C2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2855BC9A-3F17-48FF-AE97-46ADB30AD0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "E12CD6C1-1441-48E1-89BF-0C9C735B94E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "0298ACD6-BAC6-4E0E-9962-3882F90700AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8BAB6FF3-7978-47CA-BFBD-6211106C46BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88707E5B-2040-40AB-A8D2-39D6B97E40B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "F04A22BF-A461-4B5F-BB30-5F5C2FE56134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A9F98075-6210-4332-B76E-ECDFF1D55D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A57F16D-2020-46F1-BA1A-DAE484F31920",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi:*:*:*:*:*:*:*",
"matchCriteriaId": "E19BA770-83E0-4D07-BE31-97FA8C86437B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi1:*:*:*:*:*:*:*",
"matchCriteriaId": "4627BEF7-CEEB-4CBC-8620-4D9C5A7F7C30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2:*:*:*:*:*:*:*",
"matchCriteriaId": "866E9A29-97D8-41E1-81BE-73FAF1B5E2DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2a:*:*:*:*:*:*:*",
"matchCriteriaId": "B72F30BA-0376-426F-9E74-A39231973D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi3:*:*:*:*:*:*:*",
"matchCriteriaId": "C409330E-2C8F-425F-8A9F-B04E67A83608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4:*:*:*:*:*:*:*",
"matchCriteriaId": "8940ECBB-CA08-4292-AA5C-55AB95D98580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C29F00F-1779-46BB-9964-8692AB4AD04F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi5:*:*:*:*:*:*:*",
"matchCriteriaId": "950F3BA6-DEEB-4EA5-96E3-88B33B0331D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi6:*:*:*:*:*:*:*",
"matchCriteriaId": "C48E7E3A-61B2-4188-831C-26EB583ECD71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi7:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C54AA9-EFDB-43A5-AD00-4E9965881927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8:*:*:*:*:*:*:*",
"matchCriteriaId": "B7497ED9-109E-4B44-8C16-D43F7FA1A326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8a:*:*:*:*:*:*:*",
"matchCriteriaId": "2E9F3020-E327-4DA0-BD2A-22677BEA0629",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi9:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B34634-EAEA-4FAC-98DD-E50EB7FE9286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi10:*:*:*:*:*:*:*",
"matchCriteriaId": "875897DB-094B-41BD-9205-9D4564B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi11:*:*:*:*:*:*:*",
"matchCriteriaId": "7B119CD4-DA82-4F35-B5CD-71E2434C23B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi12:*:*:*:*:*:*:*",
"matchCriteriaId": "0D581EB8-FBAC-4F48-82B5-6F8BEE2D8CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi13:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3855C5-86C9-4408-B644-78E0B17F6F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi14:*:*:*:*:*:*:*",
"matchCriteriaId": "68B47AFB-BFB5-4DF1-9F05-695BBDC21CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB7463C-01C6-4483-8EF1-1E1257738CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj1:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFE2CEF-595A-4D4D-A741-4562CD03B67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6EC6DC5-E871-43E3-991E-0EE4B310CA9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj3:*:*:*:*:*:*:*",
"matchCriteriaId": "102395E9-4110-4C7C-B152-5C60EB17D1DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4200124-000B-49C0-B380-A478C1CF4A71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj5:*:*:*:*:*:*:*",
"matchCriteriaId": "B40BAA65-D2A7-42BB-BAD7-C9F7FCE7B123",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj6:*:*:*:*:*:*:*",
"matchCriteriaId": "831B9DB1-8AB9-45A7-8DC4-FD6CED335D88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj7:*:*:*:*:*:*:*",
"matchCriteriaId": "9F17158D-9CCD-4186-B97D-51242AB92547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj8:*:*:*:*:*:*:*",
"matchCriteriaId": "1E920061-80A8-41E0-BA64-A20264020C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj9:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB5FB44-0CD9-40E1-80EC-C8CFBA023FD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj10:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3509F6-5475-4924-9E5C-4E2E03D65F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
"matchCriteriaId": "46AE17A1-7FC7-4197-825C-92B32AC64D82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
"matchCriteriaId": "00328248-72C7-4646-9312-5EAA7FE0D41E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
"matchCriteriaId": "5535D673-8DF3-4737-A531-E7B28C419235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D97E83-3091-4E46-818C-503D7D1F9D1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
"matchCriteriaId": "EE109462-C870-4C66-A7AE-B1ADED3B8DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
"matchCriteriaId": "14D0156C-3153-4A64-8491-A6A1B60FE5CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
"matchCriteriaId": "C075F42D-27C1-46A2-893A-5C0D9BE13861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF11222-0EA2-4E6B-B6DC-D16FCFEDE807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "63C5C43F-67A3-4000-845E-FDA620AD1B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "565F3777-89E2-4159-9D8E-629EB7A56837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "DC201905-7DBF-4E2B-B732-62641F51C170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "377669B9-952D-4527-9C24-E6713E749C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABC42E8-E304-4D00-8C6C-604F3EE13DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "69AB39F8-5D39-4E8A-A8A5-B91718D37A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
"matchCriteriaId": "63328822-DC2E-41A3-9E12-F5F824847AFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez2:*:*:*:*:*:*:*",
"matchCriteriaId": "350D9AFE-66AD-486B-B42D-E6A3CE62640C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez3:*:*:*:*:*:*:*",
"matchCriteriaId": "73D67BDA-AEA7-4ED2-AFA4-20283B446602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez6:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2E6D25-7528-4433-9BB3-4F45DB0FE8B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E1ADA5-C782-4F8A-A77C-A895B402A792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
"matchCriteriaId": "698C897E-CE32-4350-9315-DEE4EA5FF02C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez9:*:*:*:*:*:*:*",
"matchCriteriaId": "76C7FF79-0AFF-4DB5-BDCA-797B8FAB7F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez10:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2B02DE-CE0C-47E1-91BF-F115EE970B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez11:*:*:*:*:*:*:*",
"matchCriteriaId": "C5374A08-2788-40A0-82B5-9597C28396EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez12:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60FD51-3FD8-48F4-98EF-FEDAAF9BC52B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez13:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF1CE90-F107-4009-B2E4-19D6123B944D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez14:*:*:*:*:*:*:*",
"matchCriteriaId": "AC92E458-DC3F-4179-B6E6-14562F4291B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez15:*:*:*:*:*:*:*",
"matchCriteriaId": "1867205D-5158-41BB-8358-1A870E9DE814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "971AAF00-63AA-4B3F-8E0F-B8FBD011C071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "551A0087-5926-46AF-B1DA-3AA18FAB87E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "E19A2402-F662-4900-8137-B14EB2537173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "5757C194-AF18-434C-9F19-2FC775720556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "3048FEB4-3269-4EE1-88B5-0AA3E681402B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "DF5B2E97-12F4-4B3B-90C6-106667787472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "68BFDF59-CDED-4A52-9E24-673E86B00C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "331D55CC-055A-47E9-9019-B6AEAE0F8576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE53F4B-83D6-4E40-8117-D1983E798CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "21941E6C-4DE9-45EA-8B14-CCEF208C458F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC8D765-D1F3-43E9-BCBA-DBC4FA7BAB6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C06387D-C32E-4C3A-9A02-C0748DB88D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7a:*:*:*:*:*:*:*",
"matchCriteriaId": "D754113E-26FE-4E2E-AFF0-680866C32CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "0489630E-150D-4C80-8E93-045B89A83631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy9:*:*:*:*:*:*:*",
"matchCriteriaId": "39832F23-3841-44CA-B1C0-321CA9B59627",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy10:*:*:*:*:*:*:*",
"matchCriteriaId": "CD804E72-BAB3-4471-9EB2-11D607895357",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "C04E6B95-5FD2-4C08-BFFC-148096444DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB4363E-49B6-4682-AEF3-6B0AB38A3932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED6E6E2-AB47-442C-93B9-DEBA9D124B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3CC7F08-343B-40CC-9D03-81EE4924D6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "31444A2D-BBF0-4D6A-A898-5EC4E782CC43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD483E0-66F9-4DD1-85FA-C125C9617E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "35C1075B-11F3-453C-957D-834C5D6D8CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "115E901C-94B4-4EC7-AA85-03A20CFA90DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "C97051EE-8C42-4546-8EDC-FAD60B3EE1EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB435D9A-FA6C-4CBD-8647-3A61B3DAB338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "14181F4B-9A5C-40B4-BD15-FED694E9AE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "B62E402E-5D8B-4261-906C-C5668B4A12BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "07DCF559-9324-4CE1-A986-EF4A174DCEFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "38CC9728-4E4A-4536-BC81-031AFE1A74E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9DECC49-1DF8-4925-9232-04DA748428B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "B736A1E0-89F4-418C-BC12-7E6A7AC7891F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BDC0B5A-E59C-454E-AA0E-6EB9C8888480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2363876E-0E3B-44BA-8157-FA96554302B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D3131A-74F7-4465-826E-5F6C90240C4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0D1E17-9A5C-4B74-B780-F31364FD9F06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
"matchCriteriaId": "F70ADF53-D937-4CB1-8D17-8B4DB9A5458C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0F30A4-C088-4ECC-ABE0-33D4A7BC8D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*",
"matchCriteriaId": "73B11B78-1936-42CA-919E-BCD1E0C2A397",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
"matchCriteriaId": "A807560F-7111-40AB-BCC8-F3D7A2F92D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE56D89-5894-49E9-BDCF-E23AE4159989",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9347AF-7729-44BD-8E33-610D573C560F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*",
"matchCriteriaId": "14DC014A-2CDD-4294-8AEB-9C0B437C1633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*",
"matchCriteriaId": "B9AB472D-2158-44DC-A627-8C4D52F476A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
"matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy16:*:*:*:*:*:*:*",
"matchCriteriaId": "AC27EED6-7F43-422F-8E61-CDD4E9EDC719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE57C85-794E-405B-841F-A806D32C08EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*",
"matchCriteriaId": "7B91687C-A8F8-45FB-BF03-8534E9230AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "E082DB05-253F-4C6F-BD0A-524699309D10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B43D4858-AE1C-4372-97F9-5983EEE6ED4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "9678A6F2-0624-4A8A-9991-9DADCDDB2687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC0B809-72AD-413F-BE84-73FE2DB33950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2834B6-AA9D-4FDC-A228-CED66C799849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "B3426024-7199-4B7B-90CB-CE83FD2E0878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*",
"matchCriteriaId": "BF163F6F-1A6D-4AA9-AAC2-52249BB28421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "CD250CC8-B26A-424E-A737-97F2A7E7C4CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "C89D14BC-1718-4AE9-B107-1709C2CE965E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jax:*:*:*:*:*:*:*",
"matchCriteriaId": "2F95DC51-220F-41F9-BC48-E010746C2D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb:*:*:*:*:*:*:*",
"matchCriteriaId": "0F81AACB-C3F9-454F-A31D-E985451B0105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb2:*:*:*:*:*:*:*",
"matchCriteriaId": "853F31A7-E4A7-41DC-B6C6-36D5C665B7AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb3:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC473A4-39F2-4F32-B268-B9282B0B7823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb4:*:*:*:*:*:*:*",
"matchCriteriaId": "DF758B9D-7E81-4B27-865C-7CE675D38228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb5:*:*:*:*:*:*:*",
"matchCriteriaId": "99F26328-57B0-4E5F-932D-EEA70DF7C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb6:*:*:*:*:*:*:*",
"matchCriteriaId": "282A8AA5-B087-4F0E-A8B1-4EA811E40270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "B05373F4-E820-4D22-A86A-904854F04C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "4C38969D-65EB-4C80-BB2A-A1245C4E718B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "A429CFF2-A288-4CD5-9C06-8D18647C67E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3A9655-9E22-4AEA-BBCF-6C0749D0289E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "D80852CE-8D91-4E85-A97F-C7A9AF5278CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF777880-43BF-4D4A-9BA1-B2E925B5DE11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
"matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
"matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "E3714E18-9A21-4D04-BB5E-0299AF443E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FE61C7-3B61-4085-AD91-137459DA29D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*",
"matchCriteriaId": "71080D8B-BC81-4CDF-8626-D0F35DA40AEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*",
"matchCriteriaId": "CF10596D-457A-4DA8-8037-5E92E1D39232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb:*:*:*:*:*:*:*",
"matchCriteriaId": "ADFCDD9D-F2C9-431E-BE9C-9A89C5501939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb1:*:*:*:*:*:*:*",
"matchCriteriaId": "1783208B-3BAD-411B-AE3E-BF7F3C13BEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb2:*:*:*:*:*:*:*",
"matchCriteriaId": "E9843B15-19B6-4A35-9C9A-5B803352A46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3:*:*:*:*:*:*:*",
"matchCriteriaId": "314FAE74-75CF-4E43-ABC5-826190F49D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3a:*:*:*:*:*:*:*",
"matchCriteriaId": "261C2203-4972-45D5-8DA0-83A9AB4D6C51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3b:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB9B457-8B4B-4761-A23F-8A99F28E4CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3h:*:*:*:*:*:*:*",
"matchCriteriaId": "2590898B-201F-44EE-91D9-E3A891C974B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE089B8-4176-4618-8C1A-525A8CF96053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb5:*:*:*:*:*:*:*",
"matchCriteriaId": "32222F6C-960D-4AF6-ABA1-6BED7FEDCFCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb6:*:*:*:*:*:*:*",
"matchCriteriaId": "981C90B0-43DD-482D-9471-74E4CC5DB0BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn:*:*:*:*:*:*:*",
"matchCriteriaId": "D6098745-F5CB-4D3B-A04D-E4C1F1382FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "A37D2CBE-2B93-45CB-AB59-AFDF14277E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2911989-D074-42DF-AB58-6849B3E0B72D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "34299D29-96EC-4AAA-8137-49B292FC2D67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "5092DFCF-FEE9-4BE3-9116-01F3CBCE8A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCBDFC3-13C3-45D3-80C9-E533082FAF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "B213D7CC-AD3D-4241-AF59-5B4CFC9BA930",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E88FA32-5EBE-44BA-979B-60FE8340E8C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "C4CE0E6F-A277-48BE-8F1D-BCA48C57666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "96FDDD94-40C9-47F0-9D43-0C0267F439C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "4E77BE16-C28C-43C2-B2CC-5AC4F33F7E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3BBE82-E29A-4FD6-A897-1D80DE6ACA4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "0322D5E9-FE05-49EF-A210-A276D69B9F16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*",
"matchCriteriaId": "F188F2EB-60D2-47BB-8FA8-2F832289345E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2EB46D-16E0-4C31-8634-C33D70B5381A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "7803B445-FE22-4D4B-9F3A-68EFE528195E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
"matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e11:*:*:*:*:*:*:*",
"matchCriteriaId": "21887E28-6DED-4E1D-BC96-FED6461B95F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e12:*:*:*:*:*:*:*",
"matchCriteriaId": "0FAD4038-60A1-43ED-98EA-534B42134FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "BB369F67-A688-4AAE-AB69-24ECA7E2DB4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "249D78EB-A125-4731-A41B-62F8302D7246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "7E599088-5071-469B-980F-4BA3026856C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "21F58CEE-636B-460E-91D1-330965FA7FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA5302F-0F9E-4E0A-AA59-CB23B9A89F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "F943E4AE-F0EE-4643-B34D-44896C8CBF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6ED45F-4479-445D-8970-F90413C51B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "8922A697-63B0-480E-B91F-4C16E2F325B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "6B1EB55A-4D3A-42ED-9EA0-DF31DE62086C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "3376544F-A13B-4800-952D-08A2F429E9A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "79DA9DD7-A350-4A62-B19A-6AF90CF798F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "7113699B-762C-48BD-AD99-19D1A25995E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E178E6C-D717-48B1-B79A-4E071BDFE6AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF7DF14-DD6F-4D24-8F12-AAB145FBDB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*",
"matchCriteriaId": "71493AA2-49E9-4FF5-AC29-DC2426973EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1m:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1E9625-A8CF-4D0F-BB0D-9FB91391D977",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja4:*:*:*:*:*:*:*",
"matchCriteriaId": "85F96295-2E72-4C23-B973-791B4A2B63F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja5:*:*:*:*:*:*:*",
"matchCriteriaId": "A8555124-BAFA-45D4-8208-ED1172D55F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja6:*:*:*:*:*:*:*",
"matchCriteriaId": "A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja7:*:*:*:*:*:*:*",
"matchCriteriaId": "04B9D9B5-807F-494B-9ED2-7F4BDB32432A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja8:*:*:*:*:*:*:*",
"matchCriteriaId": "6089D71A-8D46-4819-80E9-8A29BCA47EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*",
"matchCriteriaId": "21678FDA-D2B4-4041-A52D-C7AA562FD086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja11:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja12:*:*:*:*:*:*:*",
"matchCriteriaId": "4E532352-99A6-4E45-B0E7-7F04DA411820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
"matchCriteriaId": "D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa11:*:*:*:*:*:*:*",
"matchCriteriaId": "9420ADDA-5DD7-4842-AC07-2F5588CA5817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa12:*:*:*:*:*:*:*",
"matchCriteriaId": "493428E8-D818-4EDF-BA88-E715734BF848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab:*:*:*:*:*:*:*",
"matchCriteriaId": "915E4321-D52D-4C16-8821-ED16529C9090",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC643B-AA58-42EA-A777-52FCF6065F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax1:*:*:*:*:*:*:*",
"matchCriteriaId": "9CFB57C3-6CDF-46D1-858D-D5234956653D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax2:*:*:*:*:*:*:*",
"matchCriteriaId": "330125E6-3645-40B5-8E64-009B622090B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*",
"matchCriteriaId": "02D874DF-54A1-47C7-B3D9-A9CE41A42418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb:*:*:*:*:*:*:*",
"matchCriteriaId": "1485E3A5-A586-408A-8325-7572779DD0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb1:*:*:*:*:*:*:*",
"matchCriteriaId": "2244E538-6B35-44E0-B93E-60B773745A99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9DB6B2A-19D2-4684-B07F-5D42EC850A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC1C381-4795-4992-BE3C-9615E005DE46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*",
"matchCriteriaId": "80188F84-30DE-46AC-8E0C-984126B77CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6:*:*:*:*:*:*:*",
"matchCriteriaId": "DECBF0A9-D84F-40A2-AC61-A9C59C819787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F129CF-FB92-49E9-BD86-90DDB8218FF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb8:*:*:*:*:*:*:*",
"matchCriteriaId": "9C288D58-F765-4403-BF18-CC0A62B1AA60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*",
"matchCriteriaId": "27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*",
"matchCriteriaId": "4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*",
"matchCriteriaId": "1046E19B-DB53-418A-BFEC-5CD4492E6626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*",
"matchCriteriaId": "0062D992-D990-4EC9-BABD-2EFFF84254D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81B74C-4F63-46E8-ACF4-EB707853580A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C779C9-3B83-4B26-8942-B8475FB3B5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ACA99D-5784-4F5F-AB83-F55DF8774E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFB9F99-8751-442B-9419-C2AB522D2ADC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
"matchCriteriaId": "5E33FD88-8183-40EF-97A1-2766A4BBFBE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*",
"matchCriteriaId": "A6135D11-F4C2-4B6C-BC63-1132499D64A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca8:*:*:*:*:*:*:*",
"matchCriteriaId": "3B43CA9C-977B-4C99-A520-0BCDA5D2A700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca9:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDCD3CA-FAA4-4BCA-883B-B871B8748C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*",
"matchCriteriaId": "34D7D48C-9FA1-45DB-B206-437E8ECBF53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*",
"matchCriteriaId": "3626B216-43E8-4E60-96E5-7CAA0CB67F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9B59D8B-E71A-4671-BA0B-00E56498E280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*",
"matchCriteriaId": "956C0089-E5AE-4289-B6D7-A8AB3C39AAA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*",
"matchCriteriaId": "333468BC-41F0-46ED-9561-D7D2CE6AC267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
"matchCriteriaId": "09DBAA17-61D7-4EE4-A70D-A7200DF36C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*",
"matchCriteriaId": "DF17EADC-5812-47FD-A243-287837CEC1E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*",
"matchCriteriaId": "5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8CF99C-B097-4964-B07C-FBB28EB37681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*",
"matchCriteriaId": "79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2403659-B7AD-40CE-AF88-FE2BEF0929E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1F53B1-E9FA-4480-8314-C531073B25CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*",
"matchCriteriaId": "498030A3-0AFF-4D74-98D6-74C9447E5B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCBDB71-59D7-481E-84FF-8772930F857B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda7:*:*:*:*:*:*:*",
"matchCriteriaId": "1C5906E4-31B7-45B6-B7D4-493B64741D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda8:*:*:*:*:*:*:*",
"matchCriteriaId": "09807F0F-E487-447B-8A79-96CB90858891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda9:*:*:*:*:*:*:*",
"matchCriteriaId": "01A21ED6-B633-4B59-BD32-128D0E2B3563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda11:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7AF17D-2E1E-47D7-9356-4185A5F09BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda13:*:*:*:*:*:*:*",
"matchCriteriaId": "09664703-4AF6-4213-AB74-9294DE80E648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda14:*:*:*:*:*:*:*",
"matchCriteriaId": "638B3FE5-39B1-47E7-B975-A2A88C68B573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda16:*:*:*:*:*:*:*",
"matchCriteriaId": "04D5820C-2E74-4C66-932C-00FF3D064F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda17:*:*:*:*:*:*:*",
"matchCriteriaId": "65F67B44-4215-48BC-A4DA-279178C4A6A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*",
"matchCriteriaId": "2955A319-04AC-4D0C-80B7-0C90503908C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*",
"matchCriteriaId": "B0EF13B6-A743-41D1-BB31-F17C3586C8AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*",
"matchCriteriaId": "37875B18-434B-4218-BAAF-2B593E188180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*",
"matchCriteriaId": "26BAC234-D00C-4407-A1FE-E45A14D1BDAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*",
"matchCriteriaId": "C42E2869-F179-49B7-A4E8-0F4E8EA953CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A58711A-F8C9-4F25-97D7-AE8AE64F3912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*",
"matchCriteriaId": "DE3ECC04-345F-4DAE-98F7-04E082BAEC3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*",
"matchCriteriaId": "6A919122-DE62-4032-80DF-F77C1D80B387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*",
"matchCriteriaId": "9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf11:*:*:*:*:*:*:*",
"matchCriteriaId": "68958043-1212-42AF-A205-DB731ED55114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12:*:*:*:*:*:*:*",
"matchCriteriaId": "84AE6EB6-EF3F-4DE2-ABEC-71F9010BFF0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12i:*:*:*:*:*:*:*",
"matchCriteriaId": "DD6F56B5-BE84-434D-AEC8-EB0764A832FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14:*:*:*:*:*:*:*",
"matchCriteriaId": "786741B1-2502-4F2F-A943-C50720A73D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14i:*:*:*:*:*:*:*",
"matchCriteriaId": "02693A73-85AE-4AFE-81B2-11A85251CBD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf15:*:*:*:*:*:*:*",
"matchCriteriaId": "83EFE0BC-2487-458C-B8AB-33600B9EB986",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*",
"matchCriteriaId": "746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB02DEB-81D4-4A05-BDD5-3B8BC7184159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*",
"matchCriteriaId": "B18C3383-28B0-435E-AF08-9739DADAE4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*",
"matchCriteriaId": "08C9CA39-3515-4226-8453-0B5FC62546D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*",
"matchCriteriaId": "19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*",
"matchCriteriaId": "1658FFCF-7433-4AFB-9D59-BD6CC14A4D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CA6116-2C6B-431B-BA88-63B180A00DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*",
"matchCriteriaId": "C2377350-7B69-4C49-889A-D63A3E4C1002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji6:*:*:*:*:*:*:*",
"matchCriteriaId": "2913C352-E21F-4ECE-8A13-BA21CC00D02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD90F4A-2A86-4A98-A157-D93C382717A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*",
"matchCriteriaId": "1739E9AD-154D-40C2-A761-F7133BC06C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1:*:*:*:*:*:*:*",
"matchCriteriaId": "FA700809-C25D-49F8-B930-7459F8AE9DCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*",
"matchCriteriaId": "2AEB7B3E-4E91-477F-BD62-9A28578CCA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2:*:*:*:*:*:*:*",
"matchCriteriaId": "58C5D255-C0FE-47E6-A920-3539306F9845",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8DF3B4-A424-4B70-9116-28E2C4DFB776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*",
"matchCriteriaId": "4677B840-6636-4D8C-9E1C-47FEB8F3116A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk4:*:*:*:*:*:*:*",
"matchCriteriaId": "917D5477-E47E-4A01-979A-C9A0993BE34B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk5:*:*:*:*:*:*:*",
"matchCriteriaId": "09EC7701-3B46-4CFE-9EE5-2EA393D5A6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk6:*:*:*:*:*:*:*",
"matchCriteriaId": "4E18F8C6-E592-4507-8B93-E9AEA5C12CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk7:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9881DB-6F66-41D6-8AEE-7DAE4FFF42E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk8:*:*:*:*:*:*:*",
"matchCriteriaId": "F80E00B5-6C40-4DB1-8C6D-4B90D968C5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk8a:*:*:*:*:*:*:*",
"matchCriteriaId": "4726B615-ED6B-42ED-9E7B-7161293AC439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk8b:*:*:*:*:*:*:*",
"matchCriteriaId": "6690746A-4F0B-40CC-BD38-C9F2046A16D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk9:*:*:*:*:*:*:*",
"matchCriteriaId": "603287B7-170D-4233-B6E7-0E5AA489275D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk10:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E324F1-4F76-403D-A98C-49C015CBC538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk11:*:*:*:*:*:*:*",
"matchCriteriaId": "24E99B6F-4810-4493-B5E6-35514525F614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn3:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn4:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D6C6EE-CFD9-49A9-8784-498560847737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn7:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEE60A6-9E75-4B20-A06D-411E774511B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn8:*:*:*:*:*:*:*",
"matchCriteriaId": "1451BB33-6BE0-4F4A-A193-14E13DECEE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn9:*:*:*:*:*:*:*",
"matchCriteriaId": "5F0FC09E-8C60-4EAC-B729-3BE3524E6F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC3CD43-F30A-484B-9285-D925C1262212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb1:*:*:*:*:*:*:*",
"matchCriteriaId": "F807A36A-9363-40F1-9B20-E5C4D503EB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*",
"matchCriteriaId": "5200C1CD-DEAB-44FD-970D-098F3E01F36B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*",
"matchCriteriaId": "E8E71841-512D-483C-A911-86EA745AC00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb4:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB655C5-2D7B-4ED5-89D6-4ED613CF3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb5:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE556AB-093C-4992-8F5B-F240526AAA64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb6:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA0BCD1-4E75-4F39-B960-4B6B1B357442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc:*:*:*:*:*:*:*",
"matchCriteriaId": "F17F3285-80E8-4BE5-8704-3379CF326601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*",
"matchCriteriaId": "9669DF61-DDC5-498D-906A-494D56BAE450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*",
"matchCriteriaId": "571ECF0D-06C6-4371-891C-FB68A3093F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd:*:*:*:*:*:*:*",
"matchCriteriaId": "8A38CF1F-37D9-4CBD-8B98-C24637FF7F56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd1:*:*:*:*:*:*:*",
"matchCriteriaId": "0886F6DC-C590-48A0-BE27-6CD778EB37FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*",
"matchCriteriaId": "8552242D-0A93-4841-83F9-EA4D7F58938E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*",
"matchCriteriaId": "F45D0EFD-784A-4CDB-8FDB-41F6869B4735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp1:*:*:*:*:*:*:*",
"matchCriteriaId": "942CC01D-ED6E-4731-A61B-75CDF219F760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp3:*:*:*:*:*:*:*",
"matchCriteriaId": "59CA018E-5160-40AE-953D-9559F23D2EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*",
"matchCriteriaId": "BBA595EF-8718-4477-8EEC-EA948C14F091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb1:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*",
"matchCriteriaId": "13763901-2D7B-485D-A957-E30587BCEB88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B213166-77E2-4E13-8769-FA8AF6EEC33A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A3C0371-223A-433C-B8A3-C24A499EB82F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*",
"matchCriteriaId": "A066A001-830B-4407-A5CD-AB99059C190E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*",
"matchCriteriaId": "83B45095-526D-4BC5-A16B-6B5741F07FD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpd:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A2E770-2D7A-4A09-AE89-B58F01FDE1B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1t:*:*:*:*:*:*:*",
"matchCriteriaId": "B6546067-A0AD-4BCB-8519-1DF018EBF804",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi4:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE13E73-F2E2-4F8D-B236-940C74335E3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5:*:*:*:*:*:*:*",
"matchCriteriaId": "5E08CCB1-054E-4ABB-8A68-5DC5D8464ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi6a:*:*:*:*:*:*:*",
"matchCriteriaId": "E790F111-F2C4-4898-BC24-D09C213F62DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi7:*:*:*:*:*:*:*",
"matchCriteriaId": "92A0E2C0-519E-4DFA-897E-DF5DE59434A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi8a:*:*:*:*:*:*:*",
"matchCriteriaId": "00D510BB-FB26-4991-BCB7-9E79EBD195A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi9:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AADEEE-6B71-4A4E-B33D-BEA65B9CB0B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi10:*:*:*:*:*:*:*",
"matchCriteriaId": "52CE3939-470F-47B8-8C2D-AF5F109FC971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2:*:*:*:*:*:*:*",
"matchCriteriaId": "D3BF63D2-734D-41F4-8FE0-7F07F482AA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2t:*:*:*:*:*:*:*",
"matchCriteriaId": "BD4E1437-2511-40ED-848A-FFE4542D8B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3:*:*:*:*:*:*:*",
"matchCriteriaId": "568E1EE8-78E7-4E24-88D1-9D42DE500F8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3a:*:*:*:*:*:*:*",
"matchCriteriaId": "37F71B84-9188-4333-95B1-0801F03BC496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj4:*:*:*:*:*:*:*",
"matchCriteriaId": "A42E49E0-08A9-49DF-B67D-537618A8881A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj5:*:*:*:*:*:*:*",
"matchCriteriaId": "806D68A3-6E80-4184-A5D7-FBA718B66BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj6:*:*:*:*:*:*:*",
"matchCriteriaId": "55BEDA52-B21D-4693-8E70-88350FDCACD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7:*:*:*:*:*:*:*",
"matchCriteriaId": "3E2365E7-F80F-430D-8F23-04191DE26DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7c:*:*:*:*:*:*:*",
"matchCriteriaId": "E49AB188-17B6-4C2E-BC79-D4B410F38BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj8a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D272C6-4455-4B42-813D-900862918F33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj9:*:*:*:*:*:*:*",
"matchCriteriaId": "E98F9CB3-F6D1-484A-B6CF-7C7FD78AEC04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj10:*:*:*:*:*:*:*",
"matchCriteriaId": "905019E4-5C39-43C6-987F-722E3B08D15F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj11:*:*:*:*:*:*:*",
"matchCriteriaId": "4CB14CD5-5085-4859-8E88-67B6F4A4ACA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6F2D03-4959-4AF3-ABEC-77751C40A2DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk1:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5AE65B-2974-47D5-9023-AA1FB2031DF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk2:*:*:*:*:*:*:*",
"matchCriteriaId": "35B2299C-0303-4E0B-B194-7404F8C7FF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk3:*:*:*:*:*:*:*",
"matchCriteriaId": "27DFB3D9-013F-45B9-8E03-2CA8EF23A05F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk4:*:*:*:*:*:*:*",
"matchCriteriaId": "4DDACFAF-95E5-420F-B546-CD4CCCBF3743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk5:*:*:*:*:*:*:*",
"matchCriteriaId": "98D2B2C1-8A01-4F50-A9F9-1758C9060367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk6:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7D84D9-291C-4E6C-8B67-BF51E910C812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk7:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE75D4F-AD71-4923-B00B-0EC835CC9CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk8:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA1A49E-C1BE-4BF3-A3D4-F00C12519808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk9:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E99C3F-14E6-433E-8B4F-5A196484EE72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpl:*:*:*:*:*:*:*",
"matchCriteriaId": "618D6BE0-305A-432D-A0F1-55FD119FDC2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpm:*:*:*:*:*:*:*",
"matchCriteriaId": "889E740C-2EED-4C9F-A532-0B13D257CE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn:*:*:*:*:*:*:*",
"matchCriteriaId": "F605F3D7-F81A-406C-8846-A4174688A803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn1:*:*:*:*:*:*:*",
"matchCriteriaId": "32AE012B-3E8D-4DA2-8D9A-FACBE23F4E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn2:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7E6D57-FDA9-48B8-8193-C205C1D88369",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn3:*:*:*:*:*:*:*",
"matchCriteriaId": "D040F774-2BCD-4093-B340-3D1D983AF0BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn4:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E7FF5-3647-4FD2-AB0F-4092786BE7AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A7267E3-F70A-492F-85E6-12F4AC6D38AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn6:*:*:*:*:*:*:*",
"matchCriteriaId": "F5830929-5087-450B-AB3E-F1E03828C4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpo:*:*:*:*:*:*:*",
"matchCriteriaId": "EC346170-9412-4CA5-9BE2-73F72C81A24A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpp:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1EA81C-A137-41A2-89AF-174E233AAA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq:*:*:*:*:*:*:*",
"matchCriteriaId": "58BEC384-3525-4BE2-AC0B-E2718387B77E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq1:*:*:*:*:*:*:*",
"matchCriteriaId": "A89EC5B6-C9F6-41BB-95DB-663D0121BBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq2:*:*:*:*:*:*:*",
"matchCriteriaId": "967AF15C-411D-4BB9-906E-38D74D02F82F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq3:*:*:*:*:*:*:*",
"matchCriteriaId": "73487EBB-9EB4-4048-B0C8-964D0BE330E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq4:*:*:*:*:*:*:*",
"matchCriteriaId": "2992B552-AB8C-4D7E-AAAD-F28586BF8FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq5:*:*:*:*:*:*:*",
"matchCriteriaId": "BD00E777-723E-42D5-AE2E-67B08603BD18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpr:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB21DC4-1946-44E0-BAAE-78255BFAEA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jps:*:*:*:*:*:*:*",
"matchCriteriaId": "60B75123-1D99-487A-B9EE-5F4411AF845E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpt:*:*:*:*:*:*:*",
"matchCriteriaId": "89BED107-3A18-4F09-BF8A-B712F9DE8B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpt1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBAFF110-4F3D-4FF5-95B8-16CACA58DC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpt2:*:*:*:*:*:*:*",
"matchCriteriaId": "E517D85B-CD2E-4132-A019-5C7176C72117",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "499C6196-2D34-4312-9C3E-B1A6E8D21112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "9279A96A-43B2-4FD4-97F0-DA331EACF918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "3479B06E-1B67-4399-BA3A-E02331E21BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "7855CC38-5E3E-486D-9322-7BF0DC1FF623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "496E2D60-AEEF-4D34-ABE4-9A9B101643D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "A740BDE4-B65E-4F6F-BAB7-BBA64567EC79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F391FDE-A48C-4F59-BC6F-7880B234E3A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "E10916E9-6105-46F9-993D-F09C223003B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2E9E28-64F4-469C-8F01-FC2290B57106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
"matchCriteriaId": "D962FBA3-CE59-401B-9451-45001775BA66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
"matchCriteriaId": "C13F2837-174B-4437-BF3F-CB6BFBF8F64D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "4220D3B1-BD05-4169-91BA-B1AA45084C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "84BAF351-4C7F-44F8-812E-9C402CBBB5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "0595F3D8-8D99-4C82-9EC1-1187C52A6740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "662ACAD0-7E80-4CB5-8409-03E72A3C59D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "A43EE852-5F22-4387-8332-A12FF3306210",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "02866AED-A1B4-4D89-A11F-27089EF935BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "87A96A92-02E7-440C-9E46-0FBE8CE75E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "03F1AEF3-08BD-4CC0-A36A-D26D550853E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD9FF45-C8C2-42E2-B329-48C037A10521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "36CBB93A-A8C8-477E-B530-B0058C3D15B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D029D52-65E5-4129-AB47-E873F53799CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "727E596A-295D-4D70-810A-436FC6A4415D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "368210A0-CC15-4FB9-8334-4ED475523C2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*",
"matchCriteriaId": "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*",
"matchCriteriaId": "1C258F34-C557-4586-A8D0-590EC37E252E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*",
"matchCriteriaId": "AD456B15-1AFC-470A-9750-E6D152869FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*",
"matchCriteriaId": "3B940A51-E9B1-430B-A732-F1B65F54CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy12:*:*:*:*:*:*:*",
"matchCriteriaId": "A93140A3-E0C8-4817-802A-27CBFCD40A65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy13:*:*:*:*:*:*:*",
"matchCriteriaId": "A0EE8DB0-15BE-4A3A-B4B2-1C1EAC0AD6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy14:*:*:*:*:*:*:*",
"matchCriteriaId": "9A643053-8500-4805-84E4-4FB583C0D4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy15:*:*:*:*:*:*:*",
"matchCriteriaId": "A9B05AEB-5455-4854-ABA5-35BABC07F4A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "6994F100-864F-4512-9141-F7D1050F9DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0CC364-FF3A-4FB3-8004-6628400BC7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "AF08E7CE-DE01-43B2-A9F0-1CE657E79260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "BC500D08-0DE1-4AA8-AE97-0CF17A706430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5D3761-16C8-413A-89AD-C076B9B92FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "F690BEC9-FAE9-4C02-9993-34BF14FA99EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "716EC9AA-0569-4FA7-A244-1A14FA15C5AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "39166A66-859D-43A7-9947-3F3C32FBFAAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "F421AC3C-B0BC-4177-ACDB-87792C1636EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "09CD336D-1110-4B0C-B8D4-7C96293CBADE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD51F00-C219-439F-918E-9AF20A6E053A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "57BCB671-7ED0-43D5-894F-8B3DBF44E68E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "D4802BC7-F326-4F6E-9C74-04032FF35FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDE3BCF-B518-47B0-BD3B-0B75515771E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B0621A-D7A2-415B-91ED-674F2FB4227B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*",
"matchCriteriaId": "CB52603C-CED4-4330-BB53-DDDFEA83882A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "42C9B84C-F9DC-4F9E-82F2-04004D539C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE884ADE-FD51-4F10-89A8-D871E7407C83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "AC22B2CD-5154-4055-A6A7-4C31B84B032B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*",
"matchCriteriaId": "10082A46-7AD3-4533-9A15-267953D9E642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "6ADD1575-BB35-40CE-8452-3D34E25995B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B02867-F082-4A57-9E2E-12B0F4C77526",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*",
"matchCriteriaId": "E8389200-0585-456E-8D0B-D725266ADBBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
"matchCriteriaId": "C84498B4-7002-44D1-B2B7-B43F3081D258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "0F61B07A-7933-476F-951A-AD0019D2443D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "41939712-5075-4924-ABF2-467430B37197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "945363EE-FE7A-44ED-A4A0-942A1F9B2702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
"matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "B843CEE5-4D53-414D-95C7-4BA515818E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "72480900-6E08-425F-965D-143B348E374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBA0926-E790-4B1C-A549-5B7D2F040E5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*",
"matchCriteriaId": "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
"matchCriteriaId": "4E903D9F-530D-4597-ABA9-4C1CFB79814B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
"matchCriteriaId": "5060BAEA-DF8F-4B85-84F5-1410FD45C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB56857D-029C-4DA8-B439-F1B89EA32074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F91AC2D-86F7-4618-A31B-DE081D4C21BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*",
"matchCriteriaId": "D25B94F9-F10F-47CE-8340-CE56E7ED31E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C32C536-640C-468D-872F-442697DB9EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*",
"matchCriteriaId": "38DE4F33-A677-4848-BB33-10C4A4655735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*",
"matchCriteriaId": "0894FC09-880C-44D5-B67D-81C92D96D790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
"matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
"matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
"matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "7561E37E-E7B9-419F-949F-B8EF52DF00DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "4FAF397C-C67F-488A-8346-CF37F9B7305C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "730D29C4-2BC5-478C-AAFD-E8CF598A5CFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CCCEF9-1956-41BA-8E82-925BA98A4874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0F9F49-F517-4646-B94B-A0BF4F9D6315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6b:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A31DB6-3A66-408C-8E36-2E4EE7C62E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "68A9E030-2999-4881-8EDE-4F6DED01DD43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7a:*:*:*:*:*:*:*",
"matchCriteriaId": "98368F1D-5B9E-4A8A-B210-227FA95A555A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "CC217770-5C14-4492-A41A-B46350A529F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8b:*:*:*:*:*:*:*",
"matchCriteriaId": "0D399E4E-3C90-4E74-8921-BB19FB5B64F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "3209BA66-72D4-4CC9-9176-02E14F9553ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "543B26D7-9950-4B3E-A189-2F6DE5756C1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m11:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3533E7-489E-4775-9CB2-2C545BA3EE63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP."
}
],
"id": "CVE-2025-20352",
"lastModified": "2025-10-28T13:58:42.437",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-09-24T18:15:36.930",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-20338
Vulnerability from fkie_nvd - Published: 2025-09-24 18:15 - Updated: 2025-11-14 23:41
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by logging in to the device CLI with valid administrative (level 15) credentials and using crafted commands at the CLI prompt. A successful exploit could allow the attacker to execute arbitrary commands as root.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCF5A7C-202D-44F8-97D3-694F876050D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EA559D-5184-4E19-8A32-ECA41C930AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"matchCriteriaId": "716D8805-D461-4066-9BFD-1EA895E4B997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"matchCriteriaId": "7150819E-EFB5-4224-975C-84EDBBB2881D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E81F4068-35A1-4712-9B88-F6E574B2DE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"matchCriteriaId": "28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"matchCriteriaId": "29794A8C-B1CC-492F-9A68-02EEE994743B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBBDA12-AF2E-400B-979D-3657F1F2C15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7F55DC-38F5-4B19-A699-90E1D302A04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10ee:*:*:*:*:*:*:*",
"matchCriteriaId": "9D497018-2ED5-4A0C-9E1E-1441C7F596D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.12e:*:*:*:*:*:*:*",
"matchCriteriaId": "334B45D5-14FE-4FB1-9A06-553B7E860D09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82E2A28A-700E-4546-AA94-2B13C925BDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DB62FB56-A09A-4BE3-AF4C-180903078C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7a:*:*:*:*:*:*:*",
"matchCriteriaId": "0627B380-B8E7-4BA4-BC1B-ADBCC3A6018B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7b:*:*:*:*:*:*:*",
"matchCriteriaId": "03F75200-396B-43BB-A529-9A3A45B9EBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E147E53-B047-429F-9E3B-04FB5F777B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z3:*:*:*:*:*:*:*",
"matchCriteriaId": "0656EA0A-3BB6-49AD-A6BB-922C2BC5B075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EDBECC5-25B6-461F-BE21-F4EA569DAEA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "99810E61-9C5F-4B26-8DFD-75C971593386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "B25CC70F-42ED-42EF-8CC6-50FF1F809F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "DB60F2D0-B9D2-42A8-85EC-433BCE5BEC24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5c:*:*:*:*:*:*:*",
"matchCriteriaId": "FB757B3D-14A1-4997-AA51-9870FD81763C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F9C74B-113E-4808-B979-7738E3A52B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1C482977-8384-4A57-B251-39BC01E4F7EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "B4CC3DA6-7A3D-4AFB-958A-E047D896CDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A18E50D1-BAF5-4C0F-9253-774089BAA2EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDCA684-FF44-49EB-93B5-ED6778E437BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0FD5B7-69E7-43CB-A658-E05557AC2D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBDBD9B-7122-413B-8671-17AEBE56C2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2855BC9A-3F17-48FF-AE97-46ADB30AD0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "E12CD6C1-1441-48E1-89BF-0C9C735B94E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "0298ACD6-BAC6-4E0E-9962-3882F90700AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88707E5B-2040-40AB-A8D2-39D6B97E40B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "F04A22BF-A461-4B5F-BB30-5F5C2FE56134",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by logging in to the device CLI with valid administrative (level 15) credentials and using crafted commands at the CLI prompt. A successful exploit could allow the attacker to execute arbitrary commands as root."
}
],
"id": "CVE-2025-20338",
"lastModified": "2025-11-14T23:41:58.313",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-24T18:15:36.710",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arg-inject-EyDDbh4e"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-141"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20214
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-08-05 14:36
Severity ?
Summary
A vulnerability in the Network Configuration Access Control Module (NACM) of Cisco IOS XE Software could allow an authenticated, remote attacker to obtain unauthorized read access to configuration or operational data.
This vulnerability exists because a subtle change in inner API call behavior causes results to be filtered incorrectly. An attacker could exploit this vulnerability by using either NETCONF, RESTCONF, or gRPC Network Management Interface (gNMI) protocols and query data on paths that may have been denied by the NACM configuration. A successful exploit could allow the attacker to access data that should have been restricted according to the NACM configuration.
Note: This vulnerability requires that the attacker obtain the credentials from a valid user with privileges lower than 15, and that NACM was configured to provide restricted read access for that user.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios_xe | 17.11.1 | |
| cisco | ios_xe | 17.11.1a | |
| cisco | ios_xe | 17.11.99sw | |
| cisco | ios_xe | 17.12.1 | |
| cisco | ios_xe | 17.12.1a | |
| cisco | ios_xe | 17.12.1w | |
| cisco | ios_xe | 17.12.1x | |
| cisco | ios_xe | 17.12.1y | |
| cisco | ios_xe | 17.12.1z | |
| cisco | ios_xe | 17.12.1z1 | |
| cisco | ios_xe | 17.12.2 | |
| cisco | ios_xe | 17.12.2a | |
| cisco | ios_xe | 17.13.1 | |
| cisco | ios_xe | 17.13.1a |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Network Configuration Access Control Module (NACM) of Cisco IOS XE Software could allow an authenticated, remote attacker to obtain unauthorized read access to configuration or operational data.\r\n\r This vulnerability exists because a subtle change in inner API call behavior causes results to be filtered incorrectly. An attacker could exploit this vulnerability by using either NETCONF, RESTCONF, or gRPC Network Management Interface (gNMI) protocols and query data on paths that may have been denied by the NACM configuration. A successful exploit could allow the attacker to access data that should have been restricted according to the NACM configuration.\r\n\r Note: This vulnerability requires that the attacker obtain the credentials from a valid user with privileges lower than 15, and that NACM was configured to provide restricted read access for that user."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el M\u00f3dulo de Control de Acceso a la Configuraci\u00f3n de Red (NACM) de Cisco IOS XE Software podr\u00eda permitir que un atacante remoto autenticado obtenga acceso de lectura no autorizado a datos de configuraci\u00f3n u operativos. Esta vulnerabilidad existe porque un cambio sutil en el comportamiento de las llamadas API internas provoca que los resultados se filtren incorrectamente. Un atacante podr\u00eda explotar esta vulnerabilidad utilizando los protocolos NETCONF, RESTCONF o la Interfaz de Administraci\u00f3n de Red gRPC (gNMI) y consultando datos en rutas que podr\u00edan haber sido denegadas por la configuraci\u00f3n de NACM. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a datos que deber\u00edan haber estado restringidos seg\u00fan la configuraci\u00f3n de NACM. Nota: Esta vulnerabilidad requiere que el atacante obtenga las credenciales de un usuario v\u00e1lido con privilegios inferiores a 15 y que NACM est\u00e9 configurado para proporcionar acceso de lectura restringido a ese usuario."
}
],
"id": "CVE-2025-20214",
"lastModified": "2025-08-05T14:36:54.330",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:41.573",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-netconf-nacm-bypass-TGZV9pmQ"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-639"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20202
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-08 17:17
Severity ?
Summary
A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Cisco IOS XE Wireless Controller Software podr\u00eda permitir que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los informes de vecino del Protocolo de Descubrimiento de Cisco (CDP) del punto de acceso (AP) cuando son procesados por el controlador inal\u00e1mbrico. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un paquete CDP manipulado a un AP. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar una recarga inesperada del controlador inal\u00e1mbrico que administra el AP, lo que resultar\u00eda en una denegaci\u00f3n de servicio (DoS) que afectar\u00eda a la red inal\u00e1mbrica."
}
],
"id": "CVE-2025-20202",
"lastModified": "2025-07-08T17:17:00.210",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:41.063",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-cdp-dos-fpeks9K"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-805"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20221
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:43
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in the packet filtering features of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to bypass Layer 3 and Layer 4 traffic filters.
This vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by sending a crafted packet to the affected device. A successful exploit could allow the attacker to bypass the Layer 3 and Layer 4 traffic filters and inject a crafted packet into the network.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82E2A28A-700E-4546-AA94-2B13C925BDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E147E53-B047-429F-9E3B-04FB5F777B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F9C74B-113E-4808-B979-7738E3A52B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A18E50D1-BAF5-4C0F-9253-774089BAA2EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0FD5B7-69E7-43CB-A658-E05557AC2D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBDBD9B-7122-413B-8671-17AEBE56C2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88707E5B-2040-40AB-A8D2-39D6B97E40B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "F04A22BF-A461-4B5F-BB30-5F5C2FE56134",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the packet filtering features of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to bypass Layer 3 and Layer 4 traffic filters. \r\n\r This vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by sending a crafted packet to the affected device. A successful exploit could allow the attacker to bypass the Layer 3 and Layer 4 traffic filters and inject a crafted packet into the network."
},
{
"lang": "es",
"value": "Una vulnerabilidad en las funciones de filtrado de paquetes de Cisco IOS XE SD-WAN Software podr\u00eda permitir que un atacante remoto no autenticado eluda los filtros de tr\u00e1fico de Capa 3 y Capa 4. Esta vulnerabilidad se debe a condiciones inadecuadas de filtrado de tr\u00e1fico en un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un paquete manipulado al dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante eludir los filtros de tr\u00e1fico de Capa 3 y Capa 4 e inyectar un paquete manipulado en la red."
}
],
"id": "CVE-2025-20221",
"lastModified": "2025-07-11T14:43:38.090",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:41.917",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-bypass-HHUVujdn"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20200
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:44
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerabilityĀ in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.
Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFD3A39-9E02-409C-9F9C-9C90D58D3A3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A0FE9F-FFEC-400B-8CDF-2888FDCD01A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD751BA-0987-48BB-89C0-A82F78816423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*",
"matchCriteriaId": "CDF46126-B8C2-4C03-BF28-F36BB54A6F01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC52EC4-6658-40AB-A357-F9B538F21ED2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "63B34E77-D0BD-4501-A125-CDBE9A47031F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*",
"matchCriteriaId": "9029376B-E263-4B30-8B97-7101CFF7D39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*",
"matchCriteriaId": "BD337928-C7D9-4CBC-8785-5C49FCA5B90F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*",
"matchCriteriaId": "10E83B0A-33F1-4154-969E-E66E800890DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*",
"matchCriteriaId": "287E952E-588D-4825-9EB3-03CE16F96E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*",
"matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "312FDFDD-7612-4E79-A12E-7B1540324696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "6352A220-8F3E-4E08-8DD3-50E366434333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability\u00a0in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.\r\n\r Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco IOS XE Software podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15 eleve los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar comandos de configuraci\u00f3n espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad incluyendo entradas manipuladas en comandos de configuraci\u00f3n espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitirle elevar los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. La calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso se ha elevado a Alto porque un atacante podr\u00eda acceder al sistema operativo subyacente del dispositivo afectado y realizar acciones potencialmente inadvertidas. Nota: El atacante debe tener privilegios para acceder al modo de configuraci\u00f3n en el dispositivo afectado. Esto se conoce generalmente como nivel de privilegio 15."
}
],
"id": "CVE-2025-20200",
"lastModified": "2025-07-11T14:44:54.340",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.7,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:40.667",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20198
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-08 13:56
Severity ?
4.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerabilityĀ in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.
Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability\u00a0in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.\r\n\r Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco IOS XE Software podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15 eleve los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar comandos de configuraci\u00f3n espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad incluyendo entradas manipuladas en comandos de configuraci\u00f3n espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitirle elevar los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. La calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso se ha elevado a Alto porque un atacante podr\u00eda acceder al sistema operativo subyacente del dispositivo afectado y realizar acciones potencialmente inadvertidas. Nota: El atacante debe tener privilegios para acceder al modo de configuraci\u00f3n en el dispositivo afectado. Esto se conoce generalmente como nivel de privilegio 15."
}
],
"id": "CVE-2025-20198",
"lastModified": "2025-07-08T13:56:57.540",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 2.7,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:40.303",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20197
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-08 13:57
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.
Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*",
"matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "312FDFDD-7612-4E79-A12E-7B1540324696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "6352A220-8F3E-4E08-8DD3-50E366434333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.\r\n\r Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco IOS XE Software podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15 eleve los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar comandos de configuraci\u00f3n espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad incluyendo entradas manipuladas en comandos de configuraci\u00f3n espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitirle elevar los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. La calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso se ha elevado a Alto porque un atacante podr\u00eda acceder al sistema operativo subyacente del dispositivo afectado y realizar acciones potencialmente inadvertidas. Nota: El atacante debe tener privilegios para acceder al modo de configuraci\u00f3n en el dispositivo afectado. Esto se conoce generalmente como nivel de privilegio 15."
}
],
"id": "CVE-2025-20197",
"lastModified": "2025-07-08T13:57:47.713",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.7,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:40.100",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20201
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-08-01 18:33
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerabilityĀ in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.
Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFD3A39-9E02-409C-9F9C-9C90D58D3A3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A0FE9F-FFEC-400B-8CDF-2888FDCD01A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD751BA-0987-48BB-89C0-A82F78816423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*",
"matchCriteriaId": "CDF46126-B8C2-4C03-BF28-F36BB54A6F01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC52EC4-6658-40AB-A357-F9B538F21ED2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "63B34E77-D0BD-4501-A125-CDBE9A47031F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*",
"matchCriteriaId": "9029376B-E263-4B30-8B97-7101CFF7D39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*",
"matchCriteriaId": "BD337928-C7D9-4CBC-8785-5C49FCA5B90F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*",
"matchCriteriaId": "10E83B0A-33F1-4154-969E-E66E800890DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*",
"matchCriteriaId": "287E952E-588D-4825-9EB3-03CE16F96E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*",
"matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "312FDFDD-7612-4E79-A12E-7B1540324696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "6352A220-8F3E-4E08-8DD3-50E366434333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability\u00a0in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.\r\n\r Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco IOS XE Software podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15 eleve los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar comandos de configuraci\u00f3n espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad incluyendo entradas manipuladas en comandos de configuraci\u00f3n espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitirle elevar los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. La calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso se ha elevado a Alto porque un atacante podr\u00eda acceder al sistema operativo subyacente del dispositivo afectado y realizar acciones potencialmente inadvertidas. Nota: El atacante debe tener privilegios para acceder al modo de configuraci\u00f3n en el dispositivo afectado. Esto se conoce generalmente como nivel de privilegio 15."
}
],
"id": "CVE-2025-20201",
"lastModified": "2025-08-01T18:33:35.330",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.7,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:40.870",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20199
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-08 13:48
Severity ?
4.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.
This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.
Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFD3A39-9E02-409C-9F9C-9C90D58D3A3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A0FE9F-FFEC-400B-8CDF-2888FDCD01A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD751BA-0987-48BB-89C0-A82F78816423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*",
"matchCriteriaId": "CDF46126-B8C2-4C03-BF28-F36BB54A6F01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC52EC4-6658-40AB-A357-F9B538F21ED2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "63B34E77-D0BD-4501-A125-CDBE9A47031F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*",
"matchCriteriaId": "9029376B-E263-4B30-8B97-7101CFF7D39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*",
"matchCriteriaId": "BD337928-C7D9-4CBC-8785-5C49FCA5B90F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*",
"matchCriteriaId": "10E83B0A-33F1-4154-969E-E66E800890DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*",
"matchCriteriaId": "287E952E-588D-4825-9EB3-03CE16F96E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*",
"matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "312FDFDD-7612-4E79-A12E-7B1540324696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "6352A220-8F3E-4E08-8DD3-50E366434333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.\r\n\r Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco IOS XE Software podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15 eleve los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar comandos de configuraci\u00f3n espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad incluyendo entradas manipuladas en comandos de configuraci\u00f3n espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitirle elevar los privilegios a root en el sistema operativo subyacente de un dispositivo afectado. La calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso se ha elevado a Alto porque un atacante podr\u00eda acceder al sistema operativo subyacente del dispositivo afectado y realizar acciones potencialmente inadvertidas. Nota: El atacante debe tener privilegios para acceder al modo de configuraci\u00f3n en el dispositivo afectado. Esto se conoce generalmente como nivel de privilegio 15."
}
],
"id": "CVE-2025-20199",
"lastModified": "2025-07-08T13:48:55.337",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 2.7,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:40.483",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20196
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:55
Severity ?
Summary
A vulnerability in the Cisco IOx application hosting environment of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the Cisco IOx application hosting environment to stop responding, resulting in a denial of service (DoS) condition.
This vulnerability is due to the improper handling of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to cause the Cisco IOx application hosting environment to stop responding. The IOx process will need to be manually restarted to recover services.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E147E53-B047-429F-9E3B-04FB5F777B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EDBECC5-25B6-461F-BE21-F4EA569DAEA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A18E50D1-BAF5-4C0F-9253-774089BAA2EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDCA684-FF44-49EB-93B5-ED6778E437BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0FD5B7-69E7-43CB-A658-E05557AC2D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBDBD9B-7122-413B-8671-17AEBE56C2F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cgr1000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3469A83B-8B72-49C8-B5EF-3845F493BB76",
"versionEndExcluding": "15.9\\(3\\)m12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cgr1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7C73AA-7DBA-43BD-819B-1CA5228CFB0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ir510_wpan_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC33B8FC-C936-4672-B1A1-43AB1E956FC9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ir510_wpan:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D29EAD2C-C9A3-4129-8C4F-1C0963826FA4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ic3000_industrial_compute_gateway_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81D2326E-20DA-4E8C-9ADB-C89A4F26C8E4",
"versionEndExcluding": "1.5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ic3000_industrial_compute_gateway:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1DEE8B-C9B3-4E45-BBBD-C3DF2A61C349",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B2047E0-CD0C-4C36-B5EE-A4F5079F0A4B",
"versionEndExcluding": "15.9\\(3\\)m11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:807_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEA0369-B5B1-41FD-98EE-F7F4EAB9863D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F15D3A25-21DE-4C82-B67B-3F210CDF84E2",
"versionEndExcluding": "15.9\\(3\\)m11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4558F1-B87C-439F-AF8F-C19AACAB80E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "253D4D06-FCBB-41C9-88A5-FD0E5DFC0AD8",
"versionEndExcluding": "15.9\\(3\\)m11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "398D63B0-F15B-409B-AFBC-DE6C94FAF815",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "049DE827-5687-4618-AF59-7EB2E925CFB6",
"versionEndExcluding": "17.15.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749040C6-A21A-4EF3-8213-42EE01CFA303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C76DACE3-7D3B-4FE6-8567-0C9D43FF7A7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93510CF6-232E-4FBD-BF01-79070306FB97",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77BE20A3-964E-46D3-ACA2-B53A175027D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E2B891-4F41-4D0D-BAA2-0256C0565BDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA8798F4-35BB-4F81-9385-B0274BFAAF15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5889AFA2-752E-4EDD-A837-5C003025B25C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53852300-C1D2-4F84-B8DA-4EDBCB374075",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E3AD79-8F3B-4E8E-8226-2B5101F1A3D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B64B8AB-DD2A-4306-8546-1D64E24868F4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9124i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54712AF5-EF16-4F83-99BB-D3B8D93AF986",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CADEB5A-5147-4420-A825-BAB07BD60AA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09185C81-6FDF-4E6D-B8F7-E4B5D77909F4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9162:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9347227-9FA8-46B6-96EF-713543376296",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9164:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E81F0A-5B5C-4DD3-A56F-C7BF53D4B070",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "774AEB3E-5D6A-4E66-B0B4-C014A7C180E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9166d1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5133F50-F67C-4195-B18F-887EFC88FA52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco IOx application hosting environment of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the Cisco IOx application hosting environment to stop responding, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to the improper handling of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to cause the Cisco IOx application hosting environment to stop responding. The IOx process will need to be manually restarted to recover services."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el entorno de alojamiento de aplicaciones Cisco IOx de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado provoque que dicho entorno deje de responder, lo que resulta en una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la gesti\u00f3n incorrecta de las solicitudes HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante deje de responder en el entorno de alojamiento de aplicaciones Cisco IOx. El proceso IOx deber\u00e1 reiniciarse manualmente para recuperar los servicios."
}
],
"id": "CVE-2025-20196",
"lastModified": "2025-07-11T14:55:33.920",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:39.927",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-dos-95Fqnf7b"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20193
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:57
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.r
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read files from the underlying operating system.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read files from the underlying operating system."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web del software Cisco IOS XE podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice un ataque de inyecci\u00f3n contra un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente. Un atacante podr\u00eda explotarla enviando una entrada manipulada a la interfaz de administraci\u00f3n web. Una explotaci\u00f3n exitosa podr\u00eda permitirle leer archivos del sistema operativo subyacente."
}
],
"id": "CVE-2025-20193",
"lastModified": "2025-07-11T14:57:48.353",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:39.437",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20195
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:57
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a CSRF attack and execute commands on the CLI of an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to clear the syslog, parser, and licensing logs on the affected device if the targeted user has privileges to clear those logs.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a CSRF attack and execute commands on the CLI of an affected device.\r\n\r\n This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to clear the syslog, parser, and licensing logs on the affected device if the targeted user has privileges to clear those logs."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web del software Cisco IOS XE podr\u00eda permitir que un atacante remoto no autenticado realice un ataque CSRF y ejecute comandos en la CLI de un dispositivo afectado. Esta vulnerabilidad se debe a la falta de protecci\u00f3n CSRF para la interfaz de administraci\u00f3n web de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario ya autenticado a seguir un enlace manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante borrar los registros de syslog, analizador y licencias del dispositivo afectado si el usuario objetivo tiene privilegios para borrar dichos registros."
}
],
"id": "CVE-2025-20195",
"lastModified": "2025-07-11T14:57:14.743",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:39.767",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20194
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:57
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read limited files from the underlying operating system or clear the syslog and licensing logs on the affected device.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.\r\n\r\n This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read limited files from the underlying operating system or clear the syslog and licensing logs on the affected device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web del software Cisco IOS XE podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice un ataque de inyecci\u00f3n contra un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente. Un atacante podr\u00eda explotarla enviando una entrada manipulada a la interfaz de administraci\u00f3n web. Una explotaci\u00f3n exitosa podr\u00eda permitirle leer archivos limitados del sistema operativo subyacente o borrar los registros de syslog y de licencias del dispositivo afectado."
}
],
"id": "CVE-2025-20194",
"lastModified": "2025-07-11T14:57:37.280",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:39.593",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20186
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:58
Severity ?
Summary
A vulnerability in the web-based management interface of the Wireless LAN Controller feature of Cisco IOS XE Software could allow an authenticated, remote attacker with a lobby ambassador user account to perform a command injection attack against an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with privilege level 15.
Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of the Wireless LAN Controller feature of Cisco IOS XE Software could allow an authenticated, remote attacker with a lobby ambassador user account to perform a command injection attack against an affected device.\r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with privilege level 15.\r\n\r Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de la funci\u00f3n Controlador de LAN inal\u00e1mbrica del software Cisco IOS XE podr\u00eda permitir que un atacante remoto autenticado con una cuenta de usuario embajador de lobby realice un ataque de inyecci\u00f3n de comandos contra un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente. Un atacante podr\u00eda explotarla enviando una entrada manipulada a la interfaz de administraci\u00f3n web. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios de la CLI del software Cisco IOS XE con nivel de privilegio 15. Nota: Esta vulnerabilidad solo es explotable si el atacante obtiene las credenciales de una cuenta embajador de lobby. Esta cuenta no est\u00e1 configurada por defecto."
}
],
"id": "CVE-2025-20186",
"lastModified": "2025-07-11T14:58:11.220",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:38.307",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-gVn3OKNC"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20190
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-31 15:48
Severity ?
Summary
A vulnerability in the lobby ambassador web interface of Cisco IOS XE Wireless Controller Software could allow an authenticated, remote attacker to remove arbitrary users that are defined on an affected device.
This vulnerability is due to insufficient access control of actions executed by lobby ambassador users. An attacker could exploit this vulnerability by logging in to an affected device with a lobby ambassador user account and sending crafted HTTP requests to the API. A successful exploit could allow the attacker to delete arbitrary user accounts on the device, including users with administrative privileges.
Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios_xe | 17.6.8 | |
| cisco | ios_xe | 17.9.6 | |
| cisco | ios_xe | 17.9.6a | |
| cisco | ios_xe | 17.12.1z2 | |
| cisco | ios_xe | 17.12.1z3 | |
| cisco | ios_xe | 17.15.1 | |
| cisco | ios_xe | 17.15.1x | |
| cisco | catalyst_9800-cl_wireless_controllers_for_cloud | * | |
| cisco | catalyst_9105axi | - | |
| cisco | catalyst_9115axe | - | |
| cisco | catalyst_9115axi | - | |
| cisco | catalyst_9117axi | - | |
| cisco | catalyst_9120axe | - | |
| cisco | catalyst_9120axi | - | |
| cisco | catalyst_9120axp | - | |
| cisco | catalyst_9130axe | - | |
| cisco | catalyst_9130axi | - | |
| cisco | catalyst_9800-40 | - | |
| cisco | catalyst_9800-80 | - | |
| cisco | catalyst_9800-l | - | |
| cisco | catalyst_cw9800h1 | - | |
| cisco | catalyst_cw9800h2 | - | |
| cisco | catalyst_cw9800m | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E147E53-B047-429F-9E3B-04FB5F777B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z3:*:*:*:*:*:*:*",
"matchCriteriaId": "0656EA0A-3BB6-49AD-A6BB-922C2BC5B075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F9C74B-113E-4808-B979-7738E3A52B00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:catalyst_9800-cl_wireless_controllers_for_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A66A48B9-2888-4D8B-A194-B67ED54990DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9ED0E5-CB20-4106-9CF2-8EB587B33543",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0E620C-8E09-4F7C-A326-26013173B993",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0BA345-B7D7-4975-9199-4DC7875BBFD0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_cw9800h1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4AA835E-2757-485B-8CE7-3D5BFD97C5D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_cw9800h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D63B25-1CA7-44D4-AD74-99CB4A2DA647",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_cw9800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E915BC3D-8837-4FDA-B5D3-F465DB66D1C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the lobby ambassador web interface of Cisco IOS XE Wireless Controller Software could allow an authenticated, remote attacker to remove arbitrary users that are defined on an affected device.\r\n\r This vulnerability is due to insufficient access control of actions executed by lobby ambassador users. An attacker could exploit this vulnerability by logging in to an affected device with a lobby ambassador user account and sending crafted HTTP requests to the API. A successful exploit could allow the attacker to delete arbitrary user accounts on the device, including users with administrative privileges.\r\n\r Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz web de embajador de lobby del software del controlador inal\u00e1mbrico Cisco IOS XE podr\u00eda permitir que un atacante remoto autenticado elimine usuarios arbitrarios definidos en un dispositivo afectado. Esta vulnerabilidad se debe a un control de acceso insuficiente para las acciones ejecutadas por los usuarios de embajador de lobby. Un atacante podr\u00eda explotar esta vulnerabilidad iniciando sesi\u00f3n en un dispositivo afectado con una cuenta de usuario de embajador de lobby y enviando solicitudes HTTP manipuladas a la API. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante eliminar cuentas de usuario arbitrarias en el dispositivo, incluyendo usuarios con privilegios administrativos. Nota: Esta vulnerabilidad solo es explotable si el atacante obtiene las credenciales de una cuenta de embajador de lobby. Esta cuenta no est\u00e1 configurada por defecto."
}
],
"id": "CVE-2025-20190",
"lastModified": "2025-07-31T15:48:08.890",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:38.963",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-user-del-hQxMpUDj"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20189
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-08-05 14:36
Severity ?
Summary
A vulnerability in the Cisco Express Forwarding functionality of Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers with Route Switch Processor 3 (RSP3C) could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition.
This vulnerability is due to improper memory management when Cisco IOS XE Software is processing Address Resolution Protocol (ARP) messages. An attacker could exploit this vulnerability by sending crafted ARP messages at a high rate over a period of time to an affected device. A successful exploit could allow the attacker to exhaust system resources, which eventually triggers a reload of the active route switch processor (RSP). If a redundant RSP is not present, the router reloads.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82E2A28A-700E-4546-AA94-2B13C925BDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51938C0A-AFDB-4B12-BB64-9C67FC0C738F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Express Forwarding functionality of Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers with Route Switch Processor 3 (RSP3C) could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper memory management when Cisco IOS XE Software is processing Address Resolution Protocol (ARP) messages. An attacker could exploit this vulnerability by sending crafted ARP messages at a high rate over a period of time to an affected device. A successful exploit could allow the attacker to exhaust system resources, which eventually triggers a reload of the active route switch processor (RSP). If a redundant RSP is not present, the router reloads."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n Cisco Express Forwarding del software Cisco IOS XE para routers de servicios de agregaci\u00f3n Cisco ASR 903 con procesador de conmutaci\u00f3n de ruta 3 (RSP3C) podr\u00eda permitir que un atacante adyacente no autenticado active una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a una gesti\u00f3n de memoria inadecuada cuando el software Cisco IOS XE procesa mensajes del protocolo de resoluci\u00f3n de direcciones (ARP). Un atacante podr\u00eda explotar esta vulnerabilidad enviando mensajes ARP manipulados a alta velocidad durante un per\u00edodo de tiempo a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante agotar los recursos del sistema, lo que eventualmente desencadena la recarga del procesador de conmutaci\u00f3n de ruta (RSP) activo. Si no hay un RSP redundante, el router se recarga."
}
],
"id": "CVE-2025-20189",
"lastModified": "2025-08-05T14:36:20.273",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:38.770",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr903-rsp3-arp-dos-WmfzdvJZ"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-762"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20188
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-06-23 15:15
Severity ?
Summary
A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system.
This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system.\r\n\r This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de descarga de im\u00e1genes de puntos de acceso (AP) fuera de banda del software Cisco IOS XE para controladores de LAN inal\u00e1mbrica (WLC) podr\u00eda permitir que un atacante remoto no autenticado cargue archivos arbitrarios en un sistema afectado. Esta vulnerabilidad se debe a la presencia de un token web JSON (JWT) codificado de forma r\u00edgida en un sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando solicitudes HTTPS manipuladas a la interfaz de descarga de im\u00e1genes del AP. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante cargar archivos, atravesar rutas y ejecutar comandos arbitrarios con privilegios de root. Nota: Para que la explotaci\u00f3n sea exitosa, la funci\u00f3n de descarga de im\u00e1genes de AP fuera de banda debe estar habilitada en el dispositivo. No est\u00e1 habilitada por defecto."
}
],
"id": "CVE-2025-20188",
"lastModified": "2025-06-23T15:15:11.117",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-05-07T18:15:38.617",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://horizon3.ai/attack-research/attack-blogs/cisco-ios-xe-wlc-arbitrary-file-upload-vulnerability-cve-2025-20188-analysis/"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-20162
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-11 14:58
Severity ?
Summary
A vulnerability in the DHCP snooping security feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a full interface queue wedge, which could result in a denial of service (DoS) condition.
This vulnerability is due to improper handling of DHCP request packets. An attacker could exploit this vulnerability by sending DHCP request packets to an affected device. A successful exploit could allow the attacker to cause packets to wedge in the queue, creating a DoS condition for downstream devices of the affected system and requiring that the system restart to drain the queue.
Note: This vulnerability can be exploited with either unicast or broadcast DHCP packets on a VLAN that does not have DHCP snooping enabled.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the DHCP snooping security feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a full interface queue wedge, which could result in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper handling of DHCP request packets. An attacker could exploit this vulnerability by sending DHCP request packets to an affected device. A successful exploit could allow the attacker to cause packets to wedge in the queue, creating a DoS condition for downstream devices of the affected system and requiring that the system restart to drain the queue.\r\n\r Note: This vulnerability can be exploited with either unicast or broadcast DHCP packets on a VLAN that does not have DHCP snooping enabled."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de seguridad de vigilancia DHCP del software Cisco IOS XE podr\u00eda permitir que un atacante remoto no autenticado provoque una cu\u00f1a de cola de interfaz completa, lo que podr\u00eda resultar en una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la gesti\u00f3n incorrecta de los paquetes de solicitud DHCP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes de solicitud DHCP a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar una cu\u00f1a de paquetes en la cola, creando una condici\u00f3n de DoS para los dispositivos posteriores del sistema afectado y requiriendo que el sistema se reinicie para vaciar la cola. Nota: Esta vulnerabilidad puede explotarse con paquetes DHCP de unidifusi\u00f3n o difusi\u00f3n en una VLAN que no tenga activada la vigilancia DHCP."
}
],
"id": "CVE-2025-20162",
"lastModified": "2025-07-11T14:58:36.330",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:37.663",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcpsn-dos-xBn8Mtks"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20155
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-31 15:12
Severity ?
Summary
A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system.
This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios_xe | 17.9.4 | |
| cisco | ios_xe | 17.9.4a | |
| cisco | ios_xe | 17.9.5 | |
| cisco | ios_xe | 17.9.5a | |
| cisco | ios_xe | 17.9.5b | |
| cisco | ios_xe | 17.9.5e | |
| cisco | ios_xe | 17.9.5f | |
| cisco | ios_xe | 17.9.6 | |
| cisco | ios_xe | 17.9.6a | |
| cisco | ios_xe | 17.11.99sw | |
| cisco | ios_xe | 17.12.1 | |
| cisco | ios_xe | 17.12.1a | |
| cisco | ios_xe | 17.12.1w | |
| cisco | ios_xe | 17.12.1x | |
| cisco | ios_xe | 17.12.1y | |
| cisco | ios_xe | 17.12.1z | |
| cisco | ios_xe | 17.12.1z1 | |
| cisco | ios_xe | 17.12.2 | |
| cisco | ios_xe | 17.12.2a | |
| cisco | ios_xe | 17.12.3 | |
| cisco | ios_xe | 17.12.3a | |
| cisco | ios_xe | 17.12.4 | |
| cisco | ios_xe | 17.12.4a | |
| cisco | ios_xe | 17.12.4b | |
| cisco | ios_xe | 17.13.1 | |
| cisco | ios_xe | 17.13.1a | |
| cisco | ios_xe | 17.14.1 | |
| cisco | ios_xe | 17.14.1a |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system.\r\n\r This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la carga de arranque del software Cisco IOS XE podr\u00eda permitir que un atacante local autenticado escriba archivos arbitrarios en un sistema afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente del archivo de arranque que lee el software del sistema cuando un dispositivo se implementa por primera vez en modo SD-WAN o cuando un administrador configura SD-Routing en el dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad modificando un archivo de arranque generado por Cisco Catalyst SD-WAN Manager, carg\u00e1ndolo en la memoria flash del dispositivo y, posteriormente, volviendo a cargar el dispositivo en una implementaci\u00f3n inicial en modo SD-WAN o configur\u00e1ndolo con SD-Routing. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar escrituras de archivos arbitrarias en el sistema operativo subyacente."
}
],
"id": "CVE-2025-20155",
"lastModified": "2025-07-31T15:12:21.710",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:37.330",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bootstrap-KfgxYgdh"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1287"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20154
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-31 16:44
Severity ?
Summary
A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server process to reload unexpectedly if debugs are enabled.
This vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Note: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows: Security Impact Rating (SIR): Low CVSS Base Score: 3.7 CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "456B8012-3BCD-4963-9105-8AFF73E1F8A7",
"versionEndIncluding": "15.9\\(3\\)m11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B88094D9-E2A9-4F48-BF8F-1A63E3F69CA2",
"versionEndIncluding": "17.2.3",
"versionStartIncluding": "16.6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FD2C84-CD64-4C1C-BC38-2F7A2A6EEF45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE98B34-501B-449A-843A-58F297EDBE1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "86E05C3F-4095-4B9C-8C11-E32567EB14AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "582B1A3D-68F5-4047-98B2-FEC2A9569828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "EDAABB7C-DD62-418F-9CD3-B868913453AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "DECAACAE-0DFF-43CE-83AF-84FEABAB2CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9EE8F5-2F17-45E8-91BD-9DB5EE97B0CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C1199B-57C2-4076-A612-5F75AE46B3D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB20C4D-F8AD-4887-8B73-07495439BA3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3676F8-475D-4C5D-A932-633E55A1C115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "13E2915D-36F8-4AFE-A2E0-59A8DF87A101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "79FABFF0-0D27-4954-8BA9-42187F7D9B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6FF116-1FFB-4960-942E-A1A16ACEA7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFC77F8-4131-42E1-93A4-13149BDCDC1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*",
"matchCriteriaId": "676F3DD0-6081-4C37-8E4F-210BC59C3C09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54EA6C52-E541-4426-A3DF-2FA88CA28BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B8AE8971-5003-4A39-8173-E17CE9C2523F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "36944A2B-E4F5-41DE-AC4D-55BFA603BE5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6EA55E-05BA-483F-AAE1-DD573D22D6A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BC51CBC1-3303-43EF-B617-AD0C59E36000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C710E576-B368-41C9-88A8-75D88E00F4B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC7F758-5AB7-4A45-A889-BE9DD8D0474E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB06AB15-7F91-4B17-BBBD-AC4E4D1EBF9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D7FA61-7D81-4FF3-827C-A97D35AB541B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "870B498C-3358-4EC0-B75A-B9A5D1DD40DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95BB2A02-11B4-48C1-97D7-25A9DF28ABB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CEC350-6245-453D-BB6D-79D444E1A5FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "004286E0-375F-4385-87EB-0C74BD9CAF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B255442-4F12-41A1-8050-B805AAE65947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89FBA2B4-490F-4A00-8967-063F91F197E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "93125F1D-0CE5-423F-A73E-46F2A91E5FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00D33162-F298-4B99-A3D4-283A2A4FA091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82AF763B-9299-4EDC-B42D-B83736839CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F70AB37-3C0B-40A8-BC37-5A79DA5F45F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "921B3622-76A3-4D9F-936C-25A965CE1A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "56092600-ABD2-4703-BA00-9DD0AE09B46D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B7EEF2-9B6A-43FC-8DBE-F82B8E01BCAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2E5C0909-27D8-4B6E-A644-9B8ADFA24266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8B842317-A5DB-4890-948A-DD26B7AE2540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "00EA89C8-AAE8-48F1-91E4-7AE46083A802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "48928FFF-871C-4C07-8352-8C802FAD8F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "06FDB11D-C54D-4654-8142-B50D306A6A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84BABFE7-1350-4FB0-B9ED-5F08E386BC40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FE3667-1B5E-48FB-B3BB-1C1854FFEE72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0370A9-E422-4109-81A3-DE2118A20827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3E20F814-87D4-41A5-B0A0-30AC6C6F2BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82CD7F68-9569-43F4-88ED-96F9A15C065D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D2C4C062-F816-41FE-ADAD-F994F4FA4A07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A07E9C56-D143-45FA-99FF-30F54A828BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F406EAA7-0607-419F-97E3-7ACEC8A3FA5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9D0641-28F8-4CCB-AEC3-205409D1704A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1ECA7B4C-8FDD-4053-B37B-E5E0969C0CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "D21DEFD5-EC43-496B-BBE1-C71C6055BC04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "83150BDE-63B7-4B36-8584-E2E950E878CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.3.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8511927B-4297-47BA-BC02-6250BC40DF2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "40C6D7C4-A5D9-4365-9664-EF35586925AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC41A004-2029-4E22-A88F-2B93D9786B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "2E19F529-B25B-4B4B-879B-872D45C7C3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D501F5A6-4E23-4A9F-A550-37BB94691687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57F7D7FD-24A8-4DD4-8280-A18244059F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A7448D1-BC19-45AB-BF6F-3434F8CA2CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A057808-1BCA-4C7C-A2D9-0BD5B09D20F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D09FC0-73C5-4F7A-8013-0B0E5CC834FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA4A8AF-348D-4F90-B1CB-AE784E0A6EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "23A66FF7-9BAB-40DA-8B90-C3C271D7E893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C95648D-A37A-446B-B106-12612C00A34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF31489-C029-4D4C-8401-26873FC469E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2F79CAFA-73B0-4589-9938-B7898071279C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "43AA14EF-3240-442E-935A-DF455FB107D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1807BE16-BAA9-4BC6-B98A-13D584A12821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "375746CB-695E-4019-89C9-42ED37A5E958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7D05C0-4065-448B-AAC6-F29E379F3DA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D8ADA2B1-FD5A-4900-953B-30951C8EF9AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B4C7223-3EFB-48C2-BE22-941F60826D0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE83701-C0B7-4ED2-866B-44B7F54FCA0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.23:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8B2427-D8C6-420B-A71F-7FD7274DF0A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "164B241C-397A-4921-BC5B-F928A21E91C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD3875D-D283-4961-BE31-750FDF9CDF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "87EF9DC5-4BE2-429D-B9BA-EF9F29E7E0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEC28C0-8091-49F9-88D1-CB96234BF52A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1ED2B72-A65C-47E4-87B3-D83F29428396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8904CAA5-4E01-462C-AE57-067902CD95FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7750EA99-EC55-4F94-8730-18583647BBBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.11.21:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEA7A0B-E20F-4ECC-A789-A4282EAC3029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE8E968-111F-4F57-93D3-E509AB540B87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B342A550-8600-45CF-8B9A-530770C9A0F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D64E1C4D-46B0-4A18-B8EE-BEA732CBF1F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "52002032-AB4E-4F3C-B832-EAA83F9EF97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "11288A28-F0CF-4FEC-A0B7-3D93866F01FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "35D1FF2C-A40C-44EB-AAB1-A70B94E3D717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:24.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD120B9-0671-473C-8420-872E5BB9933F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server\u0026nbsp;process to reload unexpectedly if debugs are enabled.\r\n\r\nThis vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\nNote: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows:\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Security Impact Rating (SIR): Low\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;CVSS Base Score: 3.7\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n de servidor del Protocolo de Medici\u00f3n Activa Bidireccional (TWAMP) del software Cisco IOS y Cisco IOS XE podr\u00eda permitir que un atacante remoto no autenticado recargue el dispositivo afectado, lo que resulta en una denegaci\u00f3n de servicio (DoS). En el software Cisco IOS XR, esta vulnerabilidad podr\u00eda provocar que el proceso ipsla_ippm_server se recargue inesperadamente si se habilitan las depuraciones. Esta vulnerabilidad se debe a un acceso fuera de los l\u00edmites a la matriz al procesar paquetes de control TWAMP especialmente manipulados. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes de control TWAMP dise\u00f1ados a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante recargue el dispositivo afectado, lo que resulta en una denegaci\u00f3n de servicio (DoS). Nota: En el software Cisco IOS XR, solo el proceso ipsla_ippm_server se recarga inesperadamente y solo cuando se habilitan las depuraciones. Los detalles de la vulnerabilidad del software Cisco IOS XR son los siguientes: Clasificaci\u00f3n de impacto de seguridad (SIR): baja. Puntuaci\u00f3n base CVSS: 3,7. Vector CVSS: CVSS: 3.1/AV: N/AC: H/PR: N/UI: N/S: U/C: N/I: N/A: L."
}
],
"id": "CVE-2025-20154",
"lastModified": "2025-07-31T16:44:45.460",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:37.177",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-twamp-kV4FHugn"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
FKIE_CVE-2025-20140
Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-07-31 16:56
Severity ?
Summary
A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent wireless attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of IPv6 network requests from an associated wireless IPv6 client to an affected device. To associate a client to a device, an attacker may first need to authenticate to the network, or associate freely in the case of a configured open network. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to stop responding, resulting in a DoS condition.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:catalyst_9800-cl_wireless_controllers_for_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A66A48B9-2888-4D8B-A194-B67ED54990DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9ED0E5-CB20-4106-9CF2-8EB587B33543",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0E620C-8E09-4F7C-A326-26013173B993",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0BA345-B7D7-4975-9199-4DC7875BBFD0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_cw9800h1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4AA835E-2757-485B-8CE7-3D5BFD97C5D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_cw9800h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D63B25-1CA7-44D4-AD74-99CB4A2DA647",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_cw9800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E915BC3D-8837-4FDA-B5D3-F465DB66D1C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent wireless attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of IPv6 network requests from an associated wireless IPv6 client to an affected device. To associate a client to a device, an attacker may first need to authenticate to the network, or associate freely in the case of a configured open network. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to stop responding, resulting in a DoS condition."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el demonio de control de red inal\u00e1mbrica (wncd) del software Cisco IOS XE para controladores de LAN inal\u00e1mbrica (WLC) podr\u00eda permitir que un atacante inal\u00e1mbrico adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a una gesti\u00f3n de memoria inadecuada. Un atacante podr\u00eda explotarla enviando una serie de solicitudes de red IPv6 desde un cliente inal\u00e1mbrico IPv6 asociado a un dispositivo afectado. Para asociar un cliente a un dispositivo, el atacante podr\u00eda necesitar primero autenticarse en la red o asociarse libremente en el caso de una red abierta configurada. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar que el proceso wncd consuma memoria disponible y, finalmente, que el dispositivo deje de responder, lo que resulta en una denegaci\u00f3n de servicio (DoS)."
}
],
"id": "CVE-2025-20140",
"lastModified": "2025-07-31T16:56:47.507",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Primary"
}
]
},
"published": "2025-05-07T18:15:36.640",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-p6Gvt6HL"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-789"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
CVE-2025-20338 (GCVE-0-2025-20338)
Vulnerability from cvelistv5 ā Published: 2025-09-24 17:14 ā Updated: 2025-09-25 03:55
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by logging in to the device CLI with valid administrative (level 15) credentials and using crafted commands at the CLI prompt. A successful exploit could allow the attacker to execute arbitrary commands as root.
Severity ?
6 (Medium)
CWE
- CWE-141 - Improper Neutralization of Parameter/Argument Delimiters
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
3.5.0E
Affected: 3.5.1E Affected: 3.5.2E Affected: 3.5.3E Affected: 3.11.1S Affected: 3.11.2S Affected: 3.11.0S Affected: 3.11.3S Affected: 3.11.4S Affected: 3.12.0S Affected: 3.12.1S Affected: 3.12.2S Affected: 3.12.3S Affected: 3.12.0aS Affected: 3.12.4S Affected: 3.13.0S Affected: 3.13.1S Affected: 3.13.2S Affected: 3.13.3S Affected: 3.13.4S Affected: 3.13.5S Affected: 3.13.2aS Affected: 3.13.0aS Affected: 3.13.5aS Affected: 3.13.6S Affected: 3.13.7S Affected: 3.13.6aS Affected: 3.13.7aS Affected: 3.13.8S Affected: 3.13.9S Affected: 3.13.10S Affected: 3.6.0E Affected: 3.6.1E Affected: 3.6.2aE Affected: 3.6.2E Affected: 3.6.3E Affected: 3.6.4E Affected: 3.6.5E Affected: 3.6.6E Affected: 3.6.5aE Affected: 3.6.7E Affected: 3.6.8E Affected: 3.6.7bE Affected: 3.6.9E Affected: 3.6.10E Affected: 3.14.0S Affected: 3.14.1S Affected: 3.14.2S Affected: 3.14.3S Affected: 3.14.4S Affected: 3.15.0S Affected: 3.15.1S Affected: 3.15.2S Affected: 3.15.1cS Affected: 3.15.3S Affected: 3.15.4S Affected: 3.7.0E Affected: 3.7.1E Affected: 3.7.2E Affected: 3.7.3E Affected: 3.7.4E Affected: 3.7.5E Affected: 3.5.0SQ Affected: 3.5.1SQ Affected: 3.5.2SQ Affected: 3.5.3SQ Affected: 3.5.4SQ Affected: 3.5.5SQ Affected: 3.5.6SQ Affected: 3.5.7SQ Affected: 3.5.8SQ Affected: 3.16.0S Affected: 3.16.1S Affected: 3.16.1aS Affected: 3.16.2S Affected: 3.16.2aS Affected: 3.16.0cS Affected: 3.16.3S Affected: 3.16.2bS Affected: 3.16.3aS Affected: 3.16.4S Affected: 3.16.4aS Affected: 3.16.4bS Affected: 3.16.5S Affected: 3.16.4dS Affected: 3.16.6S Affected: 3.16.7S Affected: 3.16.6bS Affected: 3.16.7aS Affected: 3.16.7bS Affected: 3.16.8S Affected: 3.16.9S Affected: 3.16.10S Affected: 3.17.0S Affected: 3.17.1S Affected: 3.17.2S Affected: 3.17.1aS Affected: 3.17.3S Affected: 3.17.4S Affected: 3.8.0E Affected: 3.8.1E Affected: 3.8.2E Affected: 3.8.3E Affected: 3.8.4E Affected: 3.8.5E Affected: 3.8.5aE Affected: 3.8.6E Affected: 3.8.7E Affected: 3.8.8E Affected: 3.8.9E Affected: 3.8.10E Affected: 3.8.10eE Affected: 3.18.0aS Affected: 3.18.0S Affected: 3.18.1S Affected: 3.18.2S Affected: 3.18.3S Affected: 3.18.4S Affected: 3.18.0SP Affected: 3.18.1SP Affected: 3.18.1aSP Affected: 3.18.1bSP Affected: 3.18.1cSP Affected: 3.18.2SP Affected: 3.18.2aSP Affected: 3.18.3SP Affected: 3.18.4SP Affected: 3.18.3aSP Affected: 3.18.3bSP Affected: 3.18.5SP Affected: 3.18.6SP Affected: 3.18.7SP Affected: 3.18.8aSP Affected: 3.18.9SP Affected: 3.9.0E Affected: 3.9.1E Affected: 3.9.2E Affected: 16.6.1 Affected: 16.6.2 Affected: 16.6.3 Affected: 16.6.4 Affected: 16.6.5 Affected: 16.6.4a Affected: 16.6.5a Affected: 16.6.6 Affected: 16.6.7 Affected: 16.6.8 Affected: 16.6.9 Affected: 16.6.10 Affected: 16.7.1 Affected: 16.7.1a Affected: 16.7.1b Affected: 16.7.2 Affected: 16.7.3 Affected: 16.7.4 Affected: 16.8.1 Affected: 16.8.1a Affected: 16.8.1b Affected: 16.8.1s Affected: 16.8.1c Affected: 16.8.1d Affected: 16.8.2 Affected: 16.8.1e Affected: 16.8.3 Affected: 16.9.1 Affected: 16.9.2 Affected: 16.9.1a Affected: 16.9.1b Affected: 16.9.1s Affected: 16.9.3 Affected: 16.9.4 Affected: 16.9.3a Affected: 16.9.5 Affected: 16.9.5f Affected: 16.9.6 Affected: 16.9.7 Affected: 16.9.8 Affected: 16.10.1 Affected: 16.10.1a Affected: 16.10.1b Affected: 16.10.1s Affected: 16.10.1c Affected: 16.10.1e Affected: 16.10.1d Affected: 16.10.2 Affected: 16.10.1f Affected: 16.10.1g Affected: 16.10.3 Affected: 3.10.0E Affected: 3.10.1E Affected: 3.10.0cE Affected: 3.10.2E Affected: 3.10.3E Affected: 16.11.1 Affected: 16.11.1a Affected: 16.11.1b Affected: 16.11.2 Affected: 16.11.1s Affected: 16.12.1 Affected: 16.12.1s Affected: 16.12.1a Affected: 16.12.1c Affected: 16.12.1w Affected: 16.12.2 Affected: 16.12.1y Affected: 16.12.2a Affected: 16.12.3 Affected: 16.12.8 Affected: 16.12.2s Affected: 16.12.1x Affected: 16.12.1t Affected: 16.12.4 Affected: 16.12.3s Affected: 16.12.3a Affected: 16.12.4a Affected: 16.12.5 Affected: 16.12.6 Affected: 16.12.1z1 Affected: 16.12.5a Affected: 16.12.5b Affected: 16.12.1z2 Affected: 16.12.6a Affected: 16.12.7 Affected: 16.12.9 Affected: 16.12.10 Affected: 16.12.10a Affected: 16.12.11 Affected: 16.12.12 Affected: 16.12.13 Affected: 3.11.0E Affected: 3.11.1E Affected: 3.11.2E Affected: 3.11.3E Affected: 3.11.1aE Affected: 3.11.4E Affected: 3.11.3aE Affected: 3.11.5E Affected: 3.11.6E Affected: 3.11.7E Affected: 3.11.8E Affected: 3.11.9E Affected: 3.11.10E Affected: 3.11.11E Affected: 3.11.12E Affected: 17.1.1 Affected: 17.1.1a Affected: 17.1.1s Affected: 17.1.1t Affected: 17.1.3 Affected: 17.2.1 Affected: 17.2.1r Affected: 17.2.1a Affected: 17.2.1v Affected: 17.2.2 Affected: 17.2.3 Affected: 17.3.1 Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.6.8 Affected: 17.6.8a Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.6 Affected: 17.9.6a Affected: 17.9.7 Affected: 17.9.5e Affected: 17.9.5f Affected: 17.9.7a Affected: 17.9.7b Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.4 Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.12.1z2 Affected: 17.12.4a Affected: 17.12.5 Affected: 17.12.4b Affected: 17.12.1z3 Affected: 17.12.5a Affected: 17.12.1z4 Affected: 17.12.5b Affected: 17.12.5c Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.15.1 Affected: 17.15.1w Affected: 17.15.1a Affected: 17.15.2 Affected: 17.15.1b Affected: 17.15.1x Affected: 17.15.1z Affected: 17.15.3 Affected: 17.15.2c Affected: 17.15.2a Affected: 17.15.1y Affected: 17.15.2b Affected: 17.15.3a Affected: 17.15.3b Affected: 17.16.1 Affected: 17.16.1a |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20338",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-24T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-25T03:55:59.105Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.11.1S"
},
{
"status": "affected",
"version": "3.11.2S"
},
{
"status": "affected",
"version": "3.11.0S"
},
{
"status": "affected",
"version": "3.11.3S"
},
{
"status": "affected",
"version": "3.11.4S"
},
{
"status": "affected",
"version": "3.12.0S"
},
{
"status": "affected",
"version": "3.12.1S"
},
{
"status": "affected",
"version": "3.12.2S"
},
{
"status": "affected",
"version": "3.12.3S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.12.4S"
},
{
"status": "affected",
"version": "3.13.0S"
},
{
"status": "affected",
"version": "3.13.1S"
},
{
"status": "affected",
"version": "3.13.2S"
},
{
"status": "affected",
"version": "3.13.3S"
},
{
"status": "affected",
"version": "3.13.4S"
},
{
"status": "affected",
"version": "3.13.5S"
},
{
"status": "affected",
"version": "3.13.2aS"
},
{
"status": "affected",
"version": "3.13.0aS"
},
{
"status": "affected",
"version": "3.13.5aS"
},
{
"status": "affected",
"version": "3.13.6S"
},
{
"status": "affected",
"version": "3.13.7S"
},
{
"status": "affected",
"version": "3.13.6aS"
},
{
"status": "affected",
"version": "3.13.7aS"
},
{
"status": "affected",
"version": "3.13.8S"
},
{
"status": "affected",
"version": "3.13.9S"
},
{
"status": "affected",
"version": "3.13.10S"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.2aS"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.3aS"
},
{
"status": "affected",
"version": "3.16.4S"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.16.6S"
},
{
"status": "affected",
"version": "3.16.7S"
},
{
"status": "affected",
"version": "3.16.6bS"
},
{
"status": "affected",
"version": "3.16.7aS"
},
{
"status": "affected",
"version": "3.16.7bS"
},
{
"status": "affected",
"version": "3.16.8S"
},
{
"status": "affected",
"version": "3.16.9S"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "3.17.4S"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.8.8E"
},
{
"status": "affected",
"version": "3.8.9E"
},
{
"status": "affected",
"version": "3.8.10E"
},
{
"status": "affected",
"version": "3.8.10eE"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.2S"
},
{
"status": "affected",
"version": "3.18.3S"
},
{
"status": "affected",
"version": "3.18.4S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.1bSP"
},
{
"status": "affected",
"version": "3.18.1cSP"
},
{
"status": "affected",
"version": "3.18.2SP"
},
{
"status": "affected",
"version": "3.18.2aSP"
},
{
"status": "affected",
"version": "3.18.3SP"
},
{
"status": "affected",
"version": "3.18.4SP"
},
{
"status": "affected",
"version": "3.18.3aSP"
},
{
"status": "affected",
"version": "3.18.3bSP"
},
{
"status": "affected",
"version": "3.18.5SP"
},
{
"status": "affected",
"version": "3.18.6SP"
},
{
"status": "affected",
"version": "3.18.7SP"
},
{
"status": "affected",
"version": "3.18.8aSP"
},
{
"status": "affected",
"version": "3.18.9SP"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.2E"
},
{
"status": "affected",
"version": "3.10.3E"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "16.12.13"
},
{
"status": "affected",
"version": "3.11.0E"
},
{
"status": "affected",
"version": "3.11.1E"
},
{
"status": "affected",
"version": "3.11.2E"
},
{
"status": "affected",
"version": "3.11.3E"
},
{
"status": "affected",
"version": "3.11.1aE"
},
{
"status": "affected",
"version": "3.11.4E"
},
{
"status": "affected",
"version": "3.11.3aE"
},
{
"status": "affected",
"version": "3.11.5E"
},
{
"status": "affected",
"version": "3.11.6E"
},
{
"status": "affected",
"version": "3.11.7E"
},
{
"status": "affected",
"version": "3.11.8E"
},
{
"status": "affected",
"version": "3.11.9E"
},
{
"status": "affected",
"version": "3.11.10E"
},
{
"status": "affected",
"version": "3.11.11E"
},
{
"status": "affected",
"version": "3.11.12E"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.7"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.9.7a"
},
{
"status": "affected",
"version": "17.9.7b"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.5"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.12.1z3"
},
{
"status": "affected",
"version": "17.12.5a"
},
{
"status": "affected",
"version": "17.12.1z4"
},
{
"status": "affected",
"version": "17.12.5b"
},
{
"status": "affected",
"version": "17.12.5c"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.15.1z"
},
{
"status": "affected",
"version": "17.15.3"
},
{
"status": "affected",
"version": "17.15.2c"
},
{
"status": "affected",
"version": "17.15.2a"
},
{
"status": "affected",
"version": "17.15.1y"
},
{
"status": "affected",
"version": "17.15.2b"
},
{
"status": "affected",
"version": "17.15.3a"
},
{
"status": "affected",
"version": "17.15.3b"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by logging in to the device CLI with valid administrative (level 15) credentials and using crafted commands at the CLI prompt. A successful exploit could allow the attacker to execute arbitrary commands as root."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-141",
"description": "Improper Neutralization of Parameter/Argument Delimiters",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-24T17:14:57.638Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxe-arg-inject-EyDDbh4e",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arg-inject-EyDDbh4e"
}
],
"source": {
"advisory": "cisco-sa-iosxe-arg-inject-EyDDbh4e",
"defects": [
"CSCwm41327"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20338",
"datePublished": "2025-09-24T17:14:57.638Z",
"dateReserved": "2024-10-10T19:15:13.255Z",
"dateUpdated": "2025-09-25T03:55:59.105Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20352 (GCVE-0-2025-20352)
Vulnerability from cvelistv5 ā Published: 2025-09-24 17:10 ā Updated: 2025-10-21 22:45
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:
An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials.
An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device.
An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks.
This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.
Note: This vulnerability affects all versions of SNMP.
Severity ?
7.7 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | IOS |
Affected:
12.2(55)SE
Affected: 12.2(55)SE3 Affected: 12.2(55)SE2 Affected: 12.2(58)SE Affected: 12.2(55)SE1 Affected: 12.2(58)SE1 Affected: 12.2(55)SE4 Affected: 12.2(58)SE2 Affected: 12.2(55)SE5 Affected: 12.2(55)SE6 Affected: 12.2(55)SE7 Affected: 12.2(55)SE8 Affected: 12.2(55)SE9 Affected: 12.2(55)SE10 Affected: 12.2(55)SE11 Affected: 12.2(55)SE12 Affected: 12.2(55)SE13 Affected: 12.2(58)EZ Affected: 12.2(53)EZ Affected: 12.2(55)EZ Affected: 12.2(60)EZ Affected: 12.2(60)EZ1 Affected: 12.2(60)EZ2 Affected: 12.2(60)EZ3 Affected: 12.2(60)EZ4 Affected: 12.2(60)EZ5 Affected: 12.2(60)EZ6 Affected: 12.2(60)EZ7 Affected: 12.2(60)EZ8 Affected: 12.2(60)EZ9 Affected: 12.2(60)EZ10 Affected: 12.2(60)EZ11 Affected: 12.2(60)EZ12 Affected: 12.2(60)EZ13 Affected: 12.2(60)EZ14 Affected: 12.2(60)EZ15 Affected: 12.2(33)SXI2 Affected: 12.2(33)SXI3 Affected: 12.2(33)SXI5 Affected: 12.2(33)SXI4a Affected: 12.2(33)SXI4 Affected: 12.2(33)SXI2a Affected: 12.2(33)SXI Affected: 12.2(33)SXI6 Affected: 12.2(33)SXI7 Affected: 12.2(33)SXI1 Affected: 12.2(33)SXI8 Affected: 12.2(33)SXI9 Affected: 12.2(33)SXI8a Affected: 12.2(33)SXI10 Affected: 12.2(33)SXI11 Affected: 12.2(33)SXI12 Affected: 12.2(33)SXI13 Affected: 12.2(33)SXI14 Affected: 12.2(50)SQ2 Affected: 12.2(50)SQ1 Affected: 12.2(50)SQ Affected: 12.2(50)SQ3 Affected: 12.2(50)SQ4 Affected: 12.2(50)SQ5 Affected: 12.2(50)SQ6 Affected: 12.2(50)SQ7 Affected: 15.3(1)T Affected: 15.3(2)T Affected: 15.3(1)T1 Affected: 15.3(1)T2 Affected: 15.3(1)T3 Affected: 15.3(1)T4 Affected: 15.3(2)T1 Affected: 15.3(2)T2 Affected: 15.3(2)T3 Affected: 15.3(2)T4 Affected: 15.0(1)EY Affected: 15.0(1)EY1 Affected: 15.0(1)EY2 Affected: 15.0(2)EY Affected: 15.0(2)EY1 Affected: 15.0(2)EY2 Affected: 15.0(2)EY3 Affected: 15.0(1)SE Affected: 15.0(2)SE Affected: 15.0(1)SE1 Affected: 15.0(1)SE2 Affected: 15.0(1)SE3 Affected: 15.0(2)SE1 Affected: 15.0(2)SE2 Affected: 15.0(2)SE3 Affected: 15.0(2)SE4 Affected: 15.0(2)SE5 Affected: 15.0(2)SE6 Affected: 15.0(2)SE7 Affected: 15.0(2)SE8 Affected: 15.0(2)SE9 Affected: 15.0(2)SE10 Affected: 15.0(2)SE11 Affected: 15.0(2)SE10a Affected: 15.0(2)SE12 Affected: 15.0(2)SE13 Affected: 15.0(1)SY Affected: 15.0(1)SY1 Affected: 15.0(1)SY2 Affected: 15.0(1)SY3 Affected: 15.0(1)SY4 Affected: 15.0(1)SY5 Affected: 15.0(1)SY6 Affected: 15.0(1)SY7 Affected: 15.0(1)SY8 Affected: 15.0(1)SY7a Affected: 15.0(1)SY9 Affected: 15.0(1)SY10 Affected: 12.2(33)SXJ Affected: 12.2(33)SXJ1 Affected: 12.2(33)SXJ2 Affected: 12.2(33)SXJ3 Affected: 12.2(33)SXJ4 Affected: 12.2(33)SXJ5 Affected: 12.2(33)SXJ6 Affected: 12.2(33)SXJ7 Affected: 12.2(33)SXJ8 Affected: 12.2(33)SXJ9 Affected: 12.2(33)SXJ10 Affected: 15.1(1)SG Affected: 15.1(2)SG Affected: 15.1(1)SG1 Affected: 15.1(1)SG2 Affected: 15.1(2)SG1 Affected: 15.1(2)SG2 Affected: 15.1(2)SG3 Affected: 15.1(2)SG4 Affected: 15.1(2)SG5 Affected: 15.1(2)SG6 Affected: 15.1(2)SG7 Affected: 15.1(2)SG8 Affected: 15.2(4)M Affected: 15.2(4)M1 Affected: 15.2(4)M2 Affected: 15.2(4)M4 Affected: 15.2(4)M3 Affected: 15.2(4)M5 Affected: 15.2(4)M8 Affected: 15.2(4)M10 Affected: 15.2(4)M7 Affected: 15.2(4)M6 Affected: 15.2(4)M9 Affected: 15.2(4)M6a Affected: 15.2(4)M11 Affected: 15.0(2)SG Affected: 15.0(2)SG1 Affected: 15.0(2)SG2 Affected: 15.0(2)SG3 Affected: 15.0(2)SG4 Affected: 15.0(2)SG5 Affected: 15.0(2)SG6 Affected: 15.0(2)SG7 Affected: 15.0(2)SG8 Affected: 15.0(2)SG9 Affected: 15.0(2)SG10 Affected: 15.0(2)SG11 Affected: 15.2(2)GC Affected: 15.2(3)GC Affected: 15.2(3)GC1 Affected: 15.2(4)GC Affected: 15.2(4)GC1 Affected: 15.2(4)GC2 Affected: 15.2(4)GC3 Affected: 15.1(1)SY Affected: 15.1(1)SY1 Affected: 15.1(2)SY Affected: 15.1(2)SY1 Affected: 15.1(2)SY2 Affected: 15.1(1)SY2 Affected: 15.1(1)SY3 Affected: 15.1(2)SY3 Affected: 15.1(1)SY4 Affected: 15.1(2)SY4 Affected: 15.1(1)SY5 Affected: 15.1(2)SY5 Affected: 15.1(2)SY4a Affected: 15.1(1)SY6 Affected: 15.1(2)SY6 Affected: 15.1(2)SY7 Affected: 15.1(2)SY8 Affected: 15.1(2)SY9 Affected: 15.1(2)SY10 Affected: 15.1(2)SY11 Affected: 15.1(2)SY12 Affected: 15.1(2)SY13 Affected: 15.1(2)SY14 Affected: 15.1(2)SY15 Affected: 15.1(2)SY16 Affected: 15.4(1)T Affected: 15.4(2)T Affected: 15.4(1)T2 Affected: 15.4(1)T1 Affected: 15.4(1)T3 Affected: 15.4(2)T1 Affected: 15.4(2)T3 Affected: 15.4(2)T2 Affected: 15.4(1)T4 Affected: 15.4(2)T4 Affected: 15.0(2)EA Affected: 15.0(2)EA1 Affected: 15.2(1)E Affected: 15.2(2)E Affected: 15.2(1)E1 Affected: 15.2(3)E Affected: 15.2(1)E2 Affected: 15.2(1)E3 Affected: 15.2(2)E1 Affected: 15.2(4)E Affected: 15.2(3)E1 Affected: 15.2(2)E2 Affected: 15.2(2a)E1 Affected: 15.2(2)E3 Affected: 15.2(2a)E2 Affected: 15.2(3)E2 Affected: 15.2(3a)E Affected: 15.2(3)E3 Affected: 15.2(4)E1 Affected: 15.2(2)E4 Affected: 15.2(2)E5 Affected: 15.2(4)E2 Affected: 15.2(3)E4 Affected: 15.2(5)E Affected: 15.2(4)E3 Affected: 15.2(2)E6 Affected: 15.2(5a)E Affected: 15.2(5)E1 Affected: 15.2(5b)E Affected: 15.2(2)E5a Affected: 15.2(5c)E Affected: 15.2(2)E5b Affected: 15.2(5a)E1 Affected: 15.2(4)E4 Affected: 15.2(2)E7 Affected: 15.2(5)E2 Affected: 15.2(6)E Affected: 15.2(4)E5 Affected: 15.2(5)E2c Affected: 15.2(2)E8 Affected: 15.2(6)E0a Affected: 15.2(6)E1 Affected: 15.2(6)E0c Affected: 15.2(4)E6 Affected: 15.2(6)E2 Affected: 15.2(2)E9 Affected: 15.2(4)E7 Affected: 15.2(7)E Affected: 15.2(2)E10 Affected: 15.2(4)E8 Affected: 15.2(6)E2a Affected: 15.2(6)E2b Affected: 15.2(7)E1 Affected: 15.2(7)E0a Affected: 15.2(7)E0b Affected: 15.2(7)E0s Affected: 15.2(6)E3 Affected: 15.2(4)E9 Affected: 15.2(7)E2 Affected: 15.2(7a)E0b Affected: 15.2(4)E10 Affected: 15.2(7)E3 Affected: 15.2(7)E1a Affected: 15.2(7b)E0b Affected: 15.2(7)E2a Affected: 15.2(4)E10a Affected: 15.2(7)E4 Affected: 15.2(7)E3k Affected: 15.2(8)E Affected: 15.2(8)E1 Affected: 15.2(7)E5 Affected: 15.2(7)E6 Affected: 15.2(8)E2 Affected: 15.2(4)E10d Affected: 15.2(7)E7 Affected: 15.2(8)E3 Affected: 15.2(7)E8 Affected: 15.2(8)E4 Affected: 15.2(7)E9 Affected: 15.2(8)E5 Affected: 15.2(8)E6 Affected: 15.2(7)E10 Affected: 15.2(7)E11 Affected: 15.2(8)E7 Affected: 15.2(7)E12 Affected: 15.2(2)JB Affected: 15.2(2)JB2 Affected: 15.2(4)JB Affected: 15.2(2)JB3 Affected: 15.2(4)JB1 Affected: 15.2(4)JB2 Affected: 15.2(4)JB3 Affected: 15.2(4)JB3a Affected: 15.2(2)JB4 Affected: 15.2(4)JB4 Affected: 15.2(4)JB3h Affected: 15.2(4)JB3b Affected: 15.2(4)JB5 Affected: 15.2(4)JB6 Affected: 15.2(2)JB5 Affected: 15.2(2)JB6 Affected: 15.2(2)JAX Affected: 15.3(3)M Affected: 15.3(3)M1 Affected: 15.3(3)M2 Affected: 15.3(3)M3 Affected: 15.3(3)M5 Affected: 15.3(3)M4 Affected: 15.3(3)M6 Affected: 15.3(3)M7 Affected: 15.3(3)M8 Affected: 15.3(3)M9 Affected: 15.3(3)M10 Affected: 15.3(3)M8a Affected: 15.2(4)JN Affected: 15.2(1)EY Affected: 15.0(2)EJ Affected: 15.0(2)EJ1 Affected: 15.2(1)SY Affected: 15.2(1)SY1 Affected: 15.2(1)SY0a Affected: 15.2(1)SY2 Affected: 15.2(2)SY Affected: 15.2(1)SY1a Affected: 15.2(2)SY1 Affected: 15.2(2)SY2 Affected: 15.2(1)SY3 Affected: 15.2(1)SY4 Affected: 15.2(2)SY3 Affected: 15.2(1)SY5 Affected: 15.2(1)SY6 Affected: 15.2(1)SY7 Affected: 15.2(1)SY8 Affected: 15.2(5)EX Affected: 15.0(2)EK Affected: 15.0(2)EK1 Affected: 15.4(1)CG Affected: 15.4(1)CG1 Affected: 15.4(2)CG Affected: 15.5(1)S Affected: 15.5(2)S Affected: 15.5(1)S1 Affected: 15.5(3)S Affected: 15.5(1)S2 Affected: 15.5(1)S3 Affected: 15.5(2)S1 Affected: 15.5(2)S2 Affected: 15.5(3)S1 Affected: 15.5(3)S1a Affected: 15.5(2)S3 Affected: 15.5(3)S2 Affected: 15.5(3)S0a Affected: 15.5(3)S3 Affected: 15.5(1)S4 Affected: 15.5(2)S4 Affected: 15.5(3)S4 Affected: 15.5(3)S5 Affected: 15.5(3)S6 Affected: 15.5(3)S6a Affected: 15.5(3)S7 Affected: 15.5(3)S6b Affected: 15.5(3)S8 Affected: 15.5(3)S9 Affected: 15.5(3)S10 Affected: 15.5(3)S9a Affected: 15.5(1)T Affected: 15.5(1)T1 Affected: 15.5(2)T Affected: 15.5(1)T2 Affected: 15.5(1)T3 Affected: 15.5(2)T1 Affected: 15.5(2)T2 Affected: 15.5(2)T3 Affected: 15.5(2)T4 Affected: 15.5(1)T4 Affected: 15.2(2)EA Affected: 15.2(2)EA1 Affected: 15.2(2)EA2 Affected: 15.2(3)EA Affected: 15.2(4)EA Affected: 15.2(4)EA1 Affected: 15.2(2)EA3 Affected: 15.2(4)EA3 Affected: 15.2(5)EA Affected: 15.2(4)EA4 Affected: 15.2(4)EA5 Affected: 15.2(4)EA6 Affected: 15.2(4)EA7 Affected: 15.2(4)EA8 Affected: 15.2(4)EA9 Affected: 15.2(4)EA9a Affected: 15.3(3)JN3 Affected: 15.3(3)JN4 Affected: 15.3(3)JN7 Affected: 15.3(3)JN8 Affected: 15.3(3)JN9 Affected: 15.5(3)M Affected: 15.5(3)M1 Affected: 15.5(3)M0a Affected: 15.5(3)M2 Affected: 15.5(3)M3 Affected: 15.5(3)M4 Affected: 15.5(3)M4a Affected: 15.5(3)M5 Affected: 15.5(3)M6 Affected: 15.5(3)M7 Affected: 15.5(3)M6a Affected: 15.5(3)M8 Affected: 15.5(3)M9 Affected: 15.5(3)M10 Affected: 15.3(3)JA1m Affected: 15.3(3)JA1 Affected: 15.3(3)JA4 Affected: 15.3(3)JA5 Affected: 15.3(3)JA6 Affected: 15.3(3)JA7 Affected: 15.3(3)JA8 Affected: 15.3(3)JA10 Affected: 15.3(3)JA11 Affected: 15.3(3)JA12 Affected: 15.3(3)JAA Affected: 15.3(3)JAA11 Affected: 15.3(3)JAA12 Affected: 15.3(3)JAB Affected: 15.3(3)JB Affected: 15.5(3)SN Affected: 15.0(2)SQD Affected: 15.0(2)SQD1 Affected: 15.0(2)SQD2 Affected: 15.0(2)SQD3 Affected: 15.0(2)SQD4 Affected: 15.0(2)SQD5 Affected: 15.0(2)SQD6 Affected: 15.0(2)SQD7 Affected: 15.0(2)SQD8 Affected: 15.6(1)S Affected: 15.6(2)S Affected: 15.6(2)S1 Affected: 15.6(1)S1 Affected: 15.6(1)S2 Affected: 15.6(2)S2 Affected: 15.6(1)S3 Affected: 15.6(2)S3 Affected: 15.6(1)S4 Affected: 15.6(2)S4 Affected: 15.6(1)T Affected: 15.6(2)T Affected: 15.6(1)T0a Affected: 15.6(1)T1 Affected: 15.6(2)T1 Affected: 15.6(1)T2 Affected: 15.6(2)T2 Affected: 15.6(1)T3 Affected: 15.6(2)T3 Affected: 15.3(3)JNB Affected: 15.3(3)JNB1 Affected: 15.3(3)JNB2 Affected: 15.3(3)JNB3 Affected: 15.3(3)JNB4 Affected: 15.3(3)JNB6 Affected: 15.3(3)JNB5 Affected: 15.3(3)JAX Affected: 15.3(3)JAX1 Affected: 15.3(3)JAX2 Affected: 15.3(3)JBB Affected: 15.3(3)JBB1 Affected: 15.3(3)JBB2 Affected: 15.3(3)JBB4 Affected: 15.3(3)JBB5 Affected: 15.3(3)JBB6 Affected: 15.3(3)JBB8 Affected: 15.3(3)JBB6a Affected: 15.3(3)JC Affected: 15.3(3)JC1 Affected: 15.3(3)JC2 Affected: 15.3(3)JC3 Affected: 15.3(3)JC4 Affected: 15.3(3)JC5 Affected: 15.3(3)JC6 Affected: 15.3(3)JC8 Affected: 15.3(3)JC9 Affected: 15.3(3)JC14 Affected: 15.3(1)SY Affected: 15.3(1)SY1 Affected: 15.3(1)SY2 Affected: 15.3(3)JNC Affected: 15.3(3)JNC1 Affected: 15.3(3)JNC4 Affected: 15.3(3)JNP Affected: 15.3(3)JNP1 Affected: 15.3(3)JNP3 Affected: 15.6(2)SP Affected: 15.6(2)SP1 Affected: 15.6(2)SP2 Affected: 15.6(2)SP3 Affected: 15.6(2)SP4 Affected: 15.6(2)SP5 Affected: 15.6(2)SP6 Affected: 15.6(2)SP7 Affected: 15.6(2)SP8 Affected: 15.6(2)SP9 Affected: 15.6(2)SN Affected: 15.3(3)JPB Affected: 15.3(3)JPB1 Affected: 15.3(3)JD Affected: 15.3(3)JD2 Affected: 15.3(3)JD3 Affected: 15.3(3)JD4 Affected: 15.3(3)JD5 Affected: 15.3(3)JD6 Affected: 15.3(3)JD7 Affected: 15.3(3)JD8 Affected: 15.3(3)JD9 Affected: 15.3(3)JD11 Affected: 15.3(3)JD13 Affected: 15.3(3)JD14 Affected: 15.3(3)JD16 Affected: 15.3(3)JD17 Affected: 15.6(3)M Affected: 15.6(3)M1 Affected: 15.6(3)M0a Affected: 15.6(3)M1b Affected: 15.6(3)M2 Affected: 15.6(3)M2a Affected: 15.6(3)M3 Affected: 15.6(3)M3a Affected: 15.6(3)M4 Affected: 15.6(3)M5 Affected: 15.6(3)M6 Affected: 15.6(3)M7 Affected: 15.6(3)M6a Affected: 15.6(3)M6b Affected: 15.6(3)M8 Affected: 15.6(3)M9 Affected: 15.2(4)EC1 Affected: 15.2(4)EC2 Affected: 15.3(3)JPC Affected: 15.3(3)JPC1 Affected: 15.3(3)JPC2 Affected: 15.3(3)JPC3 Affected: 15.3(3)JPC5 Affected: 15.3(3)JND Affected: 15.3(3)JND1 Affected: 15.3(3)JND2 Affected: 15.3(3)JND3 Affected: 15.4(1)SY Affected: 15.4(1)SY1 Affected: 15.4(1)SY2 Affected: 15.4(1)SY3 Affected: 15.4(1)SY4 Affected: 15.3(3)JE Affected: 15.3(3)JPD Affected: 15.3(3)JDA7 Affected: 15.3(3)JDA8 Affected: 15.3(3)JDA9 Affected: 15.3(3)JDA11 Affected: 15.3(3)JDA13 Affected: 15.3(3)JDA14 Affected: 15.3(3)JDA16 Affected: 15.3(3)JDA17 Affected: 15.5(1)SY Affected: 15.5(1)SY1 Affected: 15.5(1)SY2 Affected: 15.5(1)SY3 Affected: 15.5(1)SY4 Affected: 15.5(1)SY5 Affected: 15.5(1)SY6 Affected: 15.5(1)SY7 Affected: 15.5(1)SY8 Affected: 15.5(1)SY9 Affected: 15.5(1)SY10 Affected: 15.5(1)SY11 Affected: 15.5(1)SY12 Affected: 15.5(1)SY13 Affected: 15.5(1)SY14 Affected: 15.5(1)SY15 Affected: 15.3(3)JF Affected: 15.3(3)JF1 Affected: 15.3(3)JF2 Affected: 15.3(3)JF4 Affected: 15.3(3)JF5 Affected: 15.3(3)JF6 Affected: 15.3(3)JF7 Affected: 15.3(3)JF8 Affected: 15.3(3)JF9 Affected: 15.3(3)JF10 Affected: 15.3(3)JF11 Affected: 15.3(3)JF12 Affected: 15.3(3)JF12i Affected: 15.3(3)JF14 Affected: 15.3(3)JF14i Affected: 15.3(3)JF15 Affected: 15.3(3)JCA7 Affected: 15.3(3)JCA8 Affected: 15.3(3)JCA9 Affected: 15.7(3)M Affected: 15.7(3)M1 Affected: 15.7(3)M0a Affected: 15.7(3)M3 Affected: 15.7(3)M2 Affected: 15.7(3)M4 Affected: 15.7(3)M5 Affected: 15.7(3)M4a Affected: 15.7(3)M4b Affected: 15.7(3)M6 Affected: 15.7(3)M7 Affected: 15.7(3)M8 Affected: 15.7(3)M9 Affected: 15.3(3)JG Affected: 15.3(3)JG1 Affected: 15.3(3)JH Affected: 15.3(3)JH1 Affected: 15.3(3)JI1 Affected: 15.3(3)JI3 Affected: 15.3(3)JI4 Affected: 15.3(3)JI5 Affected: 15.3(3)JI6 Affected: 15.8(3)M Affected: 15.8(3)M1 Affected: 15.8(3)M0a Affected: 15.8(3)M0b Affected: 15.8(3)M2 Affected: 15.8(3)M1a Affected: 15.8(3)M3 Affected: 15.8(3)M2a Affected: 15.8(3)M4 Affected: 15.8(3)M3a Affected: 15.8(3)M3b Affected: 15.8(3)M5 Affected: 15.8(3)M6 Affected: 15.8(3)M7 Affected: 15.8(3)M8 Affected: 15.8(3)M9 Affected: 15.9(3)M Affected: 15.9(3)M1 Affected: 15.9(3)M0a Affected: 15.9(3)M2 Affected: 15.9(3)M3 Affected: 15.9(3)M2a Affected: 15.9(3)M3a Affected: 15.9(3)M4 Affected: 15.9(3)M3b Affected: 15.9(3)M5 Affected: 15.9(3)M4a Affected: 15.9(3)M6 Affected: 15.9(3)M7 Affected: 15.9(3)M6a Affected: 15.9(3)M6b Affected: 15.9(3)M8 Affected: 15.9(3)M7a Affected: 15.9(3)M9 Affected: 15.9(3)M8b Affected: 15.9(3)M10 Affected: 15.9(3)M11 Affected: 15.3(3)JK Affected: 15.3(3)JK1 Affected: 15.3(3)JK2 Affected: 15.3(3)JK3 Affected: 15.3(3)JK2a Affected: 15.3(3)JK1t Affected: 15.3(3)JK4 Affected: 15.3(3)JK5 Affected: 15.3(3)JK6 Affected: 15.3(3)JK7 Affected: 15.3(3)JK8 Affected: 15.3(3)JK8a Affected: 15.3(3)JK8b Affected: 15.3(3)JK9 Affected: 15.3(3)JK10 Affected: 15.3(3)JK11 Affected: 15.3(3)JJ Affected: 15.3(3)JJ1 Affected: 15.3(3)JPI1 Affected: 15.3(3)JPI4 Affected: 15.3(3)JPI1t Affected: 15.3(3)JPI5 Affected: 15.3(3)JPI7 Affected: 15.3(3)JPI6a Affected: 15.3(3)JPI8a Affected: 15.3(3)JPI9 Affected: 15.3(3)JPI10 Affected: 15.3(3)JPJ2 Affected: 15.3(3)JPJ3 Affected: 15.3(3)JPJ2t Affected: 15.3(3)JPJ3a Affected: 15.3(3)JPJ4 Affected: 15.3(3)JPJ5 Affected: 15.3(3)JPJ6 Affected: 15.3(3)JPJ7 Affected: 15.3(3)JPJ7c Affected: 15.3(3)JPJ8a Affected: 15.3(3)JPJ9 Affected: 15.3(3)JPJ10 Affected: 15.3(3)JPJ11 Affected: 15.3(3)JPK Affected: 15.3(3)JPK1 Affected: 15.3(3)JPK2 Affected: 15.3(3)JPK3 Affected: 15.3(3)JPK4 Affected: 15.3(3)JPK5 Affected: 15.3(3)JPK6 Affected: 15.3(3)JPK7 Affected: 15.3(3)JPK8 Affected: 15.3(3)JPK9 Affected: 15.3(3)JPL Affected: 15.3(3)JPM Affected: 15.3(3)JPN Affected: 15.3(3)JPN1 Affected: 15.3(3)JPN2 Affected: 15.3(3)JPN3 Affected: 15.3(3)JPN4 Affected: 15.3(3)JPN5 Affected: 15.3(3)JPN6 Affected: 15.3(3)JPO Affected: 15.3(3)JPP Affected: 15.3(3)JPQ Affected: 15.3(3)JPQ1 Affected: 15.3(3)JPQ2 Affected: 15.3(3)JPQ3 Affected: 15.3(3)JPQ4 Affected: 15.3(3)JPQ5 Affected: 15.3(3)JPR Affected: 15.3(3)JPS Affected: 15.3(3)JPT Affected: 15.3(3)JPT1 Affected: 15.3(3)JPT2 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20352",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-27T03:55:24.975809Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-09-29",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T22:45:17.376Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-09-29T00:00:00+00:00",
"value": "CVE-2025-20352 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "12.2(55)SE"
},
{
"status": "affected",
"version": "12.2(55)SE3"
},
{
"status": "affected",
"version": "12.2(55)SE2"
},
{
"status": "affected",
"version": "12.2(58)SE"
},
{
"status": "affected",
"version": "12.2(55)SE1"
},
{
"status": "affected",
"version": "12.2(58)SE1"
},
{
"status": "affected",
"version": "12.2(55)SE4"
},
{
"status": "affected",
"version": "12.2(58)SE2"
},
{
"status": "affected",
"version": "12.2(55)SE5"
},
{
"status": "affected",
"version": "12.2(55)SE6"
},
{
"status": "affected",
"version": "12.2(55)SE7"
},
{
"status": "affected",
"version": "12.2(55)SE8"
},
{
"status": "affected",
"version": "12.2(55)SE9"
},
{
"status": "affected",
"version": "12.2(55)SE10"
},
{
"status": "affected",
"version": "12.2(55)SE11"
},
{
"status": "affected",
"version": "12.2(55)SE12"
},
{
"status": "affected",
"version": "12.2(55)SE13"
},
{
"status": "affected",
"version": "12.2(58)EZ"
},
{
"status": "affected",
"version": "12.2(53)EZ"
},
{
"status": "affected",
"version": "12.2(55)EZ"
},
{
"status": "affected",
"version": "12.2(60)EZ"
},
{
"status": "affected",
"version": "12.2(60)EZ1"
},
{
"status": "affected",
"version": "12.2(60)EZ2"
},
{
"status": "affected",
"version": "12.2(60)EZ3"
},
{
"status": "affected",
"version": "12.2(60)EZ4"
},
{
"status": "affected",
"version": "12.2(60)EZ5"
},
{
"status": "affected",
"version": "12.2(60)EZ6"
},
{
"status": "affected",
"version": "12.2(60)EZ7"
},
{
"status": "affected",
"version": "12.2(60)EZ8"
},
{
"status": "affected",
"version": "12.2(60)EZ9"
},
{
"status": "affected",
"version": "12.2(60)EZ10"
},
{
"status": "affected",
"version": "12.2(60)EZ11"
},
{
"status": "affected",
"version": "12.2(60)EZ12"
},
{
"status": "affected",
"version": "12.2(60)EZ13"
},
{
"status": "affected",
"version": "12.2(60)EZ14"
},
{
"status": "affected",
"version": "12.2(60)EZ15"
},
{
"status": "affected",
"version": "12.2(33)SXI2"
},
{
"status": "affected",
"version": "12.2(33)SXI3"
},
{
"status": "affected",
"version": "12.2(33)SXI5"
},
{
"status": "affected",
"version": "12.2(33)SXI4a"
},
{
"status": "affected",
"version": "12.2(33)SXI4"
},
{
"status": "affected",
"version": "12.2(33)SXI2a"
},
{
"status": "affected",
"version": "12.2(33)SXI"
},
{
"status": "affected",
"version": "12.2(33)SXI6"
},
{
"status": "affected",
"version": "12.2(33)SXI7"
},
{
"status": "affected",
"version": "12.2(33)SXI1"
},
{
"status": "affected",
"version": "12.2(33)SXI8"
},
{
"status": "affected",
"version": "12.2(33)SXI9"
},
{
"status": "affected",
"version": "12.2(33)SXI8a"
},
{
"status": "affected",
"version": "12.2(33)SXI10"
},
{
"status": "affected",
"version": "12.2(33)SXI11"
},
{
"status": "affected",
"version": "12.2(33)SXI12"
},
{
"status": "affected",
"version": "12.2(33)SXI13"
},
{
"status": "affected",
"version": "12.2(33)SXI14"
},
{
"status": "affected",
"version": "12.2(50)SQ2"
},
{
"status": "affected",
"version": "12.2(50)SQ1"
},
{
"status": "affected",
"version": "12.2(50)SQ"
},
{
"status": "affected",
"version": "12.2(50)SQ3"
},
{
"status": "affected",
"version": "12.2(50)SQ4"
},
{
"status": "affected",
"version": "12.2(50)SQ5"
},
{
"status": "affected",
"version": "12.2(50)SQ6"
},
{
"status": "affected",
"version": "12.2(50)SQ7"
},
{
"status": "affected",
"version": "15.3(1)T"
},
{
"status": "affected",
"version": "15.3(2)T"
},
{
"status": "affected",
"version": "15.3(1)T1"
},
{
"status": "affected",
"version": "15.3(1)T2"
},
{
"status": "affected",
"version": "15.3(1)T3"
},
{
"status": "affected",
"version": "15.3(1)T4"
},
{
"status": "affected",
"version": "15.3(2)T1"
},
{
"status": "affected",
"version": "15.3(2)T2"
},
{
"status": "affected",
"version": "15.3(2)T3"
},
{
"status": "affected",
"version": "15.3(2)T4"
},
{
"status": "affected",
"version": "15.0(1)EY"
},
{
"status": "affected",
"version": "15.0(1)EY1"
},
{
"status": "affected",
"version": "15.0(1)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY"
},
{
"status": "affected",
"version": "15.0(2)EY1"
},
{
"status": "affected",
"version": "15.0(2)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY3"
},
{
"status": "affected",
"version": "15.0(1)SE"
},
{
"status": "affected",
"version": "15.0(2)SE"
},
{
"status": "affected",
"version": "15.0(1)SE1"
},
{
"status": "affected",
"version": "15.0(1)SE2"
},
{
"status": "affected",
"version": "15.0(1)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE1"
},
{
"status": "affected",
"version": "15.0(2)SE2"
},
{
"status": "affected",
"version": "15.0(2)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE4"
},
{
"status": "affected",
"version": "15.0(2)SE5"
},
{
"status": "affected",
"version": "15.0(2)SE6"
},
{
"status": "affected",
"version": "15.0(2)SE7"
},
{
"status": "affected",
"version": "15.0(2)SE8"
},
{
"status": "affected",
"version": "15.0(2)SE9"
},
{
"status": "affected",
"version": "15.0(2)SE10"
},
{
"status": "affected",
"version": "15.0(2)SE11"
},
{
"status": "affected",
"version": "15.0(2)SE10a"
},
{
"status": "affected",
"version": "15.0(2)SE12"
},
{
"status": "affected",
"version": "15.0(2)SE13"
},
{
"status": "affected",
"version": "15.0(1)SY"
},
{
"status": "affected",
"version": "15.0(1)SY1"
},
{
"status": "affected",
"version": "15.0(1)SY2"
},
{
"status": "affected",
"version": "15.0(1)SY3"
},
{
"status": "affected",
"version": "15.0(1)SY4"
},
{
"status": "affected",
"version": "15.0(1)SY5"
},
{
"status": "affected",
"version": "15.0(1)SY6"
},
{
"status": "affected",
"version": "15.0(1)SY7"
},
{
"status": "affected",
"version": "15.0(1)SY8"
},
{
"status": "affected",
"version": "15.0(1)SY7a"
},
{
"status": "affected",
"version": "15.0(1)SY9"
},
{
"status": "affected",
"version": "15.0(1)SY10"
},
{
"status": "affected",
"version": "12.2(33)SXJ"
},
{
"status": "affected",
"version": "12.2(33)SXJ1"
},
{
"status": "affected",
"version": "12.2(33)SXJ2"
},
{
"status": "affected",
"version": "12.2(33)SXJ3"
},
{
"status": "affected",
"version": "12.2(33)SXJ4"
},
{
"status": "affected",
"version": "12.2(33)SXJ5"
},
{
"status": "affected",
"version": "12.2(33)SXJ6"
},
{
"status": "affected",
"version": "12.2(33)SXJ7"
},
{
"status": "affected",
"version": "12.2(33)SXJ8"
},
{
"status": "affected",
"version": "12.2(33)SXJ9"
},
{
"status": "affected",
"version": "12.2(33)SXJ10"
},
{
"status": "affected",
"version": "15.1(1)SG"
},
{
"status": "affected",
"version": "15.1(2)SG"
},
{
"status": "affected",
"version": "15.1(1)SG1"
},
{
"status": "affected",
"version": "15.1(1)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG1"
},
{
"status": "affected",
"version": "15.1(2)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG3"
},
{
"status": "affected",
"version": "15.1(2)SG4"
},
{
"status": "affected",
"version": "15.1(2)SG5"
},
{
"status": "affected",
"version": "15.1(2)SG6"
},
{
"status": "affected",
"version": "15.1(2)SG7"
},
{
"status": "affected",
"version": "15.1(2)SG8"
},
{
"status": "affected",
"version": "15.2(4)M"
},
{
"status": "affected",
"version": "15.2(4)M1"
},
{
"status": "affected",
"version": "15.2(4)M2"
},
{
"status": "affected",
"version": "15.2(4)M4"
},
{
"status": "affected",
"version": "15.2(4)M3"
},
{
"status": "affected",
"version": "15.2(4)M5"
},
{
"status": "affected",
"version": "15.2(4)M8"
},
{
"status": "affected",
"version": "15.2(4)M10"
},
{
"status": "affected",
"version": "15.2(4)M7"
},
{
"status": "affected",
"version": "15.2(4)M6"
},
{
"status": "affected",
"version": "15.2(4)M9"
},
{
"status": "affected",
"version": "15.2(4)M6a"
},
{
"status": "affected",
"version": "15.2(4)M11"
},
{
"status": "affected",
"version": "15.0(2)SG"
},
{
"status": "affected",
"version": "15.0(2)SG1"
},
{
"status": "affected",
"version": "15.0(2)SG2"
},
{
"status": "affected",
"version": "15.0(2)SG3"
},
{
"status": "affected",
"version": "15.0(2)SG4"
},
{
"status": "affected",
"version": "15.0(2)SG5"
},
{
"status": "affected",
"version": "15.0(2)SG6"
},
{
"status": "affected",
"version": "15.0(2)SG7"
},
{
"status": "affected",
"version": "15.0(2)SG8"
},
{
"status": "affected",
"version": "15.0(2)SG9"
},
{
"status": "affected",
"version": "15.0(2)SG10"
},
{
"status": "affected",
"version": "15.0(2)SG11"
},
{
"status": "affected",
"version": "15.2(2)GC"
},
{
"status": "affected",
"version": "15.2(3)GC"
},
{
"status": "affected",
"version": "15.2(3)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC"
},
{
"status": "affected",
"version": "15.2(4)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC2"
},
{
"status": "affected",
"version": "15.2(4)GC3"
},
{
"status": "affected",
"version": "15.1(1)SY"
},
{
"status": "affected",
"version": "15.1(1)SY1"
},
{
"status": "affected",
"version": "15.1(2)SY"
},
{
"status": "affected",
"version": "15.1(2)SY1"
},
{
"status": "affected",
"version": "15.1(2)SY2"
},
{
"status": "affected",
"version": "15.1(1)SY2"
},
{
"status": "affected",
"version": "15.1(1)SY3"
},
{
"status": "affected",
"version": "15.1(2)SY3"
},
{
"status": "affected",
"version": "15.1(1)SY4"
},
{
"status": "affected",
"version": "15.1(2)SY4"
},
{
"status": "affected",
"version": "15.1(1)SY5"
},
{
"status": "affected",
"version": "15.1(2)SY5"
},
{
"status": "affected",
"version": "15.1(2)SY4a"
},
{
"status": "affected",
"version": "15.1(1)SY6"
},
{
"status": "affected",
"version": "15.1(2)SY6"
},
{
"status": "affected",
"version": "15.1(2)SY7"
},
{
"status": "affected",
"version": "15.1(2)SY8"
},
{
"status": "affected",
"version": "15.1(2)SY9"
},
{
"status": "affected",
"version": "15.1(2)SY10"
},
{
"status": "affected",
"version": "15.1(2)SY11"
},
{
"status": "affected",
"version": "15.1(2)SY12"
},
{
"status": "affected",
"version": "15.1(2)SY13"
},
{
"status": "affected",
"version": "15.1(2)SY14"
},
{
"status": "affected",
"version": "15.1(2)SY15"
},
{
"status": "affected",
"version": "15.1(2)SY16"
},
{
"status": "affected",
"version": "15.4(1)T"
},
{
"status": "affected",
"version": "15.4(2)T"
},
{
"status": "affected",
"version": "15.4(1)T2"
},
{
"status": "affected",
"version": "15.4(1)T1"
},
{
"status": "affected",
"version": "15.4(1)T3"
},
{
"status": "affected",
"version": "15.4(2)T1"
},
{
"status": "affected",
"version": "15.4(2)T3"
},
{
"status": "affected",
"version": "15.4(2)T2"
},
{
"status": "affected",
"version": "15.4(1)T4"
},
{
"status": "affected",
"version": "15.4(2)T4"
},
{
"status": "affected",
"version": "15.0(2)EA"
},
{
"status": "affected",
"version": "15.0(2)EA1"
},
{
"status": "affected",
"version": "15.2(1)E"
},
{
"status": "affected",
"version": "15.2(2)E"
},
{
"status": "affected",
"version": "15.2(1)E1"
},
{
"status": "affected",
"version": "15.2(3)E"
},
{
"status": "affected",
"version": "15.2(1)E2"
},
{
"status": "affected",
"version": "15.2(1)E3"
},
{
"status": "affected",
"version": "15.2(2)E1"
},
{
"status": "affected",
"version": "15.2(4)E"
},
{
"status": "affected",
"version": "15.2(3)E1"
},
{
"status": "affected",
"version": "15.2(2)E2"
},
{
"status": "affected",
"version": "15.2(2a)E1"
},
{
"status": "affected",
"version": "15.2(2)E3"
},
{
"status": "affected",
"version": "15.2(2a)E2"
},
{
"status": "affected",
"version": "15.2(3)E2"
},
{
"status": "affected",
"version": "15.2(3a)E"
},
{
"status": "affected",
"version": "15.2(3)E3"
},
{
"status": "affected",
"version": "15.2(4)E1"
},
{
"status": "affected",
"version": "15.2(2)E4"
},
{
"status": "affected",
"version": "15.2(2)E5"
},
{
"status": "affected",
"version": "15.2(4)E2"
},
{
"status": "affected",
"version": "15.2(3)E4"
},
{
"status": "affected",
"version": "15.2(5)E"
},
{
"status": "affected",
"version": "15.2(4)E3"
},
{
"status": "affected",
"version": "15.2(2)E6"
},
{
"status": "affected",
"version": "15.2(5a)E"
},
{
"status": "affected",
"version": "15.2(5)E1"
},
{
"status": "affected",
"version": "15.2(5b)E"
},
{
"status": "affected",
"version": "15.2(2)E5a"
},
{
"status": "affected",
"version": "15.2(5c)E"
},
{
"status": "affected",
"version": "15.2(2)E5b"
},
{
"status": "affected",
"version": "15.2(5a)E1"
},
{
"status": "affected",
"version": "15.2(4)E4"
},
{
"status": "affected",
"version": "15.2(2)E7"
},
{
"status": "affected",
"version": "15.2(5)E2"
},
{
"status": "affected",
"version": "15.2(6)E"
},
{
"status": "affected",
"version": "15.2(4)E5"
},
{
"status": "affected",
"version": "15.2(5)E2c"
},
{
"status": "affected",
"version": "15.2(2)E8"
},
{
"status": "affected",
"version": "15.2(6)E0a"
},
{
"status": "affected",
"version": "15.2(6)E1"
},
{
"status": "affected",
"version": "15.2(6)E0c"
},
{
"status": "affected",
"version": "15.2(4)E6"
},
{
"status": "affected",
"version": "15.2(6)E2"
},
{
"status": "affected",
"version": "15.2(2)E9"
},
{
"status": "affected",
"version": "15.2(4)E7"
},
{
"status": "affected",
"version": "15.2(7)E"
},
{
"status": "affected",
"version": "15.2(2)E10"
},
{
"status": "affected",
"version": "15.2(4)E8"
},
{
"status": "affected",
"version": "15.2(6)E2a"
},
{
"status": "affected",
"version": "15.2(6)E2b"
},
{
"status": "affected",
"version": "15.2(7)E1"
},
{
"status": "affected",
"version": "15.2(7)E0a"
},
{
"status": "affected",
"version": "15.2(7)E0b"
},
{
"status": "affected",
"version": "15.2(7)E0s"
},
{
"status": "affected",
"version": "15.2(6)E3"
},
{
"status": "affected",
"version": "15.2(4)E9"
},
{
"status": "affected",
"version": "15.2(7)E2"
},
{
"status": "affected",
"version": "15.2(7a)E0b"
},
{
"status": "affected",
"version": "15.2(4)E10"
},
{
"status": "affected",
"version": "15.2(7)E3"
},
{
"status": "affected",
"version": "15.2(7)E1a"
},
{
"status": "affected",
"version": "15.2(7b)E0b"
},
{
"status": "affected",
"version": "15.2(7)E2a"
},
{
"status": "affected",
"version": "15.2(4)E10a"
},
{
"status": "affected",
"version": "15.2(7)E4"
},
{
"status": "affected",
"version": "15.2(7)E3k"
},
{
"status": "affected",
"version": "15.2(8)E"
},
{
"status": "affected",
"version": "15.2(8)E1"
},
{
"status": "affected",
"version": "15.2(7)E5"
},
{
"status": "affected",
"version": "15.2(7)E6"
},
{
"status": "affected",
"version": "15.2(8)E2"
},
{
"status": "affected",
"version": "15.2(4)E10d"
},
{
"status": "affected",
"version": "15.2(7)E7"
},
{
"status": "affected",
"version": "15.2(8)E3"
},
{
"status": "affected",
"version": "15.2(7)E8"
},
{
"status": "affected",
"version": "15.2(8)E4"
},
{
"status": "affected",
"version": "15.2(7)E9"
},
{
"status": "affected",
"version": "15.2(8)E5"
},
{
"status": "affected",
"version": "15.2(8)E6"
},
{
"status": "affected",
"version": "15.2(7)E10"
},
{
"status": "affected",
"version": "15.2(7)E11"
},
{
"status": "affected",
"version": "15.2(8)E7"
},
{
"status": "affected",
"version": "15.2(7)E12"
},
{
"status": "affected",
"version": "15.2(2)JB"
},
{
"status": "affected",
"version": "15.2(2)JB2"
},
{
"status": "affected",
"version": "15.2(4)JB"
},
{
"status": "affected",
"version": "15.2(2)JB3"
},
{
"status": "affected",
"version": "15.2(4)JB1"
},
{
"status": "affected",
"version": "15.2(4)JB2"
},
{
"status": "affected",
"version": "15.2(4)JB3"
},
{
"status": "affected",
"version": "15.2(4)JB3a"
},
{
"status": "affected",
"version": "15.2(2)JB4"
},
{
"status": "affected",
"version": "15.2(4)JB4"
},
{
"status": "affected",
"version": "15.2(4)JB3h"
},
{
"status": "affected",
"version": "15.2(4)JB3b"
},
{
"status": "affected",
"version": "15.2(4)JB5"
},
{
"status": "affected",
"version": "15.2(4)JB6"
},
{
"status": "affected",
"version": "15.2(2)JB5"
},
{
"status": "affected",
"version": "15.2(2)JB6"
},
{
"status": "affected",
"version": "15.2(2)JAX"
},
{
"status": "affected",
"version": "15.3(3)M"
},
{
"status": "affected",
"version": "15.3(3)M1"
},
{
"status": "affected",
"version": "15.3(3)M2"
},
{
"status": "affected",
"version": "15.3(3)M3"
},
{
"status": "affected",
"version": "15.3(3)M5"
},
{
"status": "affected",
"version": "15.3(3)M4"
},
{
"status": "affected",
"version": "15.3(3)M6"
},
{
"status": "affected",
"version": "15.3(3)M7"
},
{
"status": "affected",
"version": "15.3(3)M8"
},
{
"status": "affected",
"version": "15.3(3)M9"
},
{
"status": "affected",
"version": "15.3(3)M10"
},
{
"status": "affected",
"version": "15.3(3)M8a"
},
{
"status": "affected",
"version": "15.2(4)JN"
},
{
"status": "affected",
"version": "15.2(1)EY"
},
{
"status": "affected",
"version": "15.0(2)EJ"
},
{
"status": "affected",
"version": "15.0(2)EJ1"
},
{
"status": "affected",
"version": "15.2(1)SY"
},
{
"status": "affected",
"version": "15.2(1)SY1"
},
{
"status": "affected",
"version": "15.2(1)SY0a"
},
{
"status": "affected",
"version": "15.2(1)SY2"
},
{
"status": "affected",
"version": "15.2(2)SY"
},
{
"status": "affected",
"version": "15.2(1)SY1a"
},
{
"status": "affected",
"version": "15.2(2)SY1"
},
{
"status": "affected",
"version": "15.2(2)SY2"
},
{
"status": "affected",
"version": "15.2(1)SY3"
},
{
"status": "affected",
"version": "15.2(1)SY4"
},
{
"status": "affected",
"version": "15.2(2)SY3"
},
{
"status": "affected",
"version": "15.2(1)SY5"
},
{
"status": "affected",
"version": "15.2(1)SY6"
},
{
"status": "affected",
"version": "15.2(1)SY7"
},
{
"status": "affected",
"version": "15.2(1)SY8"
},
{
"status": "affected",
"version": "15.2(5)EX"
},
{
"status": "affected",
"version": "15.0(2)EK"
},
{
"status": "affected",
"version": "15.0(2)EK1"
},
{
"status": "affected",
"version": "15.4(1)CG"
},
{
"status": "affected",
"version": "15.4(1)CG1"
},
{
"status": "affected",
"version": "15.4(2)CG"
},
{
"status": "affected",
"version": "15.5(1)S"
},
{
"status": "affected",
"version": "15.5(2)S"
},
{
"status": "affected",
"version": "15.5(1)S1"
},
{
"status": "affected",
"version": "15.5(3)S"
},
{
"status": "affected",
"version": "15.5(1)S2"
},
{
"status": "affected",
"version": "15.5(1)S3"
},
{
"status": "affected",
"version": "15.5(2)S1"
},
{
"status": "affected",
"version": "15.5(2)S2"
},
{
"status": "affected",
"version": "15.5(3)S1"
},
{
"status": "affected",
"version": "15.5(3)S1a"
},
{
"status": "affected",
"version": "15.5(2)S3"
},
{
"status": "affected",
"version": "15.5(3)S2"
},
{
"status": "affected",
"version": "15.5(3)S0a"
},
{
"status": "affected",
"version": "15.5(3)S3"
},
{
"status": "affected",
"version": "15.5(1)S4"
},
{
"status": "affected",
"version": "15.5(2)S4"
},
{
"status": "affected",
"version": "15.5(3)S4"
},
{
"status": "affected",
"version": "15.5(3)S5"
},
{
"status": "affected",
"version": "15.5(3)S6"
},
{
"status": "affected",
"version": "15.5(3)S6a"
},
{
"status": "affected",
"version": "15.5(3)S7"
},
{
"status": "affected",
"version": "15.5(3)S6b"
},
{
"status": "affected",
"version": "15.5(3)S8"
},
{
"status": "affected",
"version": "15.5(3)S9"
},
{
"status": "affected",
"version": "15.5(3)S10"
},
{
"status": "affected",
"version": "15.5(3)S9a"
},
{
"status": "affected",
"version": "15.5(1)T"
},
{
"status": "affected",
"version": "15.5(1)T1"
},
{
"status": "affected",
"version": "15.5(2)T"
},
{
"status": "affected",
"version": "15.5(1)T2"
},
{
"status": "affected",
"version": "15.5(1)T3"
},
{
"status": "affected",
"version": "15.5(2)T1"
},
{
"status": "affected",
"version": "15.5(2)T2"
},
{
"status": "affected",
"version": "15.5(2)T3"
},
{
"status": "affected",
"version": "15.5(2)T4"
},
{
"status": "affected",
"version": "15.5(1)T4"
},
{
"status": "affected",
"version": "15.2(2)EA"
},
{
"status": "affected",
"version": "15.2(2)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA2"
},
{
"status": "affected",
"version": "15.2(3)EA"
},
{
"status": "affected",
"version": "15.2(4)EA"
},
{
"status": "affected",
"version": "15.2(4)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA3"
},
{
"status": "affected",
"version": "15.2(4)EA3"
},
{
"status": "affected",
"version": "15.2(5)EA"
},
{
"status": "affected",
"version": "15.2(4)EA4"
},
{
"status": "affected",
"version": "15.2(4)EA5"
},
{
"status": "affected",
"version": "15.2(4)EA6"
},
{
"status": "affected",
"version": "15.2(4)EA7"
},
{
"status": "affected",
"version": "15.2(4)EA8"
},
{
"status": "affected",
"version": "15.2(4)EA9"
},
{
"status": "affected",
"version": "15.2(4)EA9a"
},
{
"status": "affected",
"version": "15.3(3)JN3"
},
{
"status": "affected",
"version": "15.3(3)JN4"
},
{
"status": "affected",
"version": "15.3(3)JN7"
},
{
"status": "affected",
"version": "15.3(3)JN8"
},
{
"status": "affected",
"version": "15.3(3)JN9"
},
{
"status": "affected",
"version": "15.5(3)M"
},
{
"status": "affected",
"version": "15.5(3)M1"
},
{
"status": "affected",
"version": "15.5(3)M0a"
},
{
"status": "affected",
"version": "15.5(3)M2"
},
{
"status": "affected",
"version": "15.5(3)M3"
},
{
"status": "affected",
"version": "15.5(3)M4"
},
{
"status": "affected",
"version": "15.5(3)M4a"
},
{
"status": "affected",
"version": "15.5(3)M5"
},
{
"status": "affected",
"version": "15.5(3)M6"
},
{
"status": "affected",
"version": "15.5(3)M7"
},
{
"status": "affected",
"version": "15.5(3)M6a"
},
{
"status": "affected",
"version": "15.5(3)M8"
},
{
"status": "affected",
"version": "15.5(3)M9"
},
{
"status": "affected",
"version": "15.5(3)M10"
},
{
"status": "affected",
"version": "15.3(3)JA1m"
},
{
"status": "affected",
"version": "15.3(3)JA1"
},
{
"status": "affected",
"version": "15.3(3)JA4"
},
{
"status": "affected",
"version": "15.3(3)JA5"
},
{
"status": "affected",
"version": "15.3(3)JA6"
},
{
"status": "affected",
"version": "15.3(3)JA7"
},
{
"status": "affected",
"version": "15.3(3)JA8"
},
{
"status": "affected",
"version": "15.3(3)JA10"
},
{
"status": "affected",
"version": "15.3(3)JA11"
},
{
"status": "affected",
"version": "15.3(3)JA12"
},
{
"status": "affected",
"version": "15.3(3)JAA"
},
{
"status": "affected",
"version": "15.3(3)JAA11"
},
{
"status": "affected",
"version": "15.3(3)JAA12"
},
{
"status": "affected",
"version": "15.3(3)JAB"
},
{
"status": "affected",
"version": "15.3(3)JB"
},
{
"status": "affected",
"version": "15.5(3)SN"
},
{
"status": "affected",
"version": "15.0(2)SQD"
},
{
"status": "affected",
"version": "15.0(2)SQD1"
},
{
"status": "affected",
"version": "15.0(2)SQD2"
},
{
"status": "affected",
"version": "15.0(2)SQD3"
},
{
"status": "affected",
"version": "15.0(2)SQD4"
},
{
"status": "affected",
"version": "15.0(2)SQD5"
},
{
"status": "affected",
"version": "15.0(2)SQD6"
},
{
"status": "affected",
"version": "15.0(2)SQD7"
},
{
"status": "affected",
"version": "15.0(2)SQD8"
},
{
"status": "affected",
"version": "15.6(1)S"
},
{
"status": "affected",
"version": "15.6(2)S"
},
{
"status": "affected",
"version": "15.6(2)S1"
},
{
"status": "affected",
"version": "15.6(1)S1"
},
{
"status": "affected",
"version": "15.6(1)S2"
},
{
"status": "affected",
"version": "15.6(2)S2"
},
{
"status": "affected",
"version": "15.6(1)S3"
},
{
"status": "affected",
"version": "15.6(2)S3"
},
{
"status": "affected",
"version": "15.6(1)S4"
},
{
"status": "affected",
"version": "15.6(2)S4"
},
{
"status": "affected",
"version": "15.6(1)T"
},
{
"status": "affected",
"version": "15.6(2)T"
},
{
"status": "affected",
"version": "15.6(1)T0a"
},
{
"status": "affected",
"version": "15.6(1)T1"
},
{
"status": "affected",
"version": "15.6(2)T1"
},
{
"status": "affected",
"version": "15.6(1)T2"
},
{
"status": "affected",
"version": "15.6(2)T2"
},
{
"status": "affected",
"version": "15.6(1)T3"
},
{
"status": "affected",
"version": "15.6(2)T3"
},
{
"status": "affected",
"version": "15.3(3)JNB"
},
{
"status": "affected",
"version": "15.3(3)JNB1"
},
{
"status": "affected",
"version": "15.3(3)JNB2"
},
{
"status": "affected",
"version": "15.3(3)JNB3"
},
{
"status": "affected",
"version": "15.3(3)JNB4"
},
{
"status": "affected",
"version": "15.3(3)JNB6"
},
{
"status": "affected",
"version": "15.3(3)JNB5"
},
{
"status": "affected",
"version": "15.3(3)JAX"
},
{
"status": "affected",
"version": "15.3(3)JAX1"
},
{
"status": "affected",
"version": "15.3(3)JAX2"
},
{
"status": "affected",
"version": "15.3(3)JBB"
},
{
"status": "affected",
"version": "15.3(3)JBB1"
},
{
"status": "affected",
"version": "15.3(3)JBB2"
},
{
"status": "affected",
"version": "15.3(3)JBB4"
},
{
"status": "affected",
"version": "15.3(3)JBB5"
},
{
"status": "affected",
"version": "15.3(3)JBB6"
},
{
"status": "affected",
"version": "15.3(3)JBB8"
},
{
"status": "affected",
"version": "15.3(3)JBB6a"
},
{
"status": "affected",
"version": "15.3(3)JC"
},
{
"status": "affected",
"version": "15.3(3)JC1"
},
{
"status": "affected",
"version": "15.3(3)JC2"
},
{
"status": "affected",
"version": "15.3(3)JC3"
},
{
"status": "affected",
"version": "15.3(3)JC4"
},
{
"status": "affected",
"version": "15.3(3)JC5"
},
{
"status": "affected",
"version": "15.3(3)JC6"
},
{
"status": "affected",
"version": "15.3(3)JC8"
},
{
"status": "affected",
"version": "15.3(3)JC9"
},
{
"status": "affected",
"version": "15.3(3)JC14"
},
{
"status": "affected",
"version": "15.3(1)SY"
},
{
"status": "affected",
"version": "15.3(1)SY1"
},
{
"status": "affected",
"version": "15.3(1)SY2"
},
{
"status": "affected",
"version": "15.3(3)JNC"
},
{
"status": "affected",
"version": "15.3(3)JNC1"
},
{
"status": "affected",
"version": "15.3(3)JNC4"
},
{
"status": "affected",
"version": "15.3(3)JNP"
},
{
"status": "affected",
"version": "15.3(3)JNP1"
},
{
"status": "affected",
"version": "15.3(3)JNP3"
},
{
"status": "affected",
"version": "15.6(2)SP"
},
{
"status": "affected",
"version": "15.6(2)SP1"
},
{
"status": "affected",
"version": "15.6(2)SP2"
},
{
"status": "affected",
"version": "15.6(2)SP3"
},
{
"status": "affected",
"version": "15.6(2)SP4"
},
{
"status": "affected",
"version": "15.6(2)SP5"
},
{
"status": "affected",
"version": "15.6(2)SP6"
},
{
"status": "affected",
"version": "15.6(2)SP7"
},
{
"status": "affected",
"version": "15.6(2)SP8"
},
{
"status": "affected",
"version": "15.6(2)SP9"
},
{
"status": "affected",
"version": "15.6(2)SN"
},
{
"status": "affected",
"version": "15.3(3)JPB"
},
{
"status": "affected",
"version": "15.3(3)JPB1"
},
{
"status": "affected",
"version": "15.3(3)JD"
},
{
"status": "affected",
"version": "15.3(3)JD2"
},
{
"status": "affected",
"version": "15.3(3)JD3"
},
{
"status": "affected",
"version": "15.3(3)JD4"
},
{
"status": "affected",
"version": "15.3(3)JD5"
},
{
"status": "affected",
"version": "15.3(3)JD6"
},
{
"status": "affected",
"version": "15.3(3)JD7"
},
{
"status": "affected",
"version": "15.3(3)JD8"
},
{
"status": "affected",
"version": "15.3(3)JD9"
},
{
"status": "affected",
"version": "15.3(3)JD11"
},
{
"status": "affected",
"version": "15.3(3)JD13"
},
{
"status": "affected",
"version": "15.3(3)JD14"
},
{
"status": "affected",
"version": "15.3(3)JD16"
},
{
"status": "affected",
"version": "15.3(3)JD17"
},
{
"status": "affected",
"version": "15.6(3)M"
},
{
"status": "affected",
"version": "15.6(3)M1"
},
{
"status": "affected",
"version": "15.6(3)M0a"
},
{
"status": "affected",
"version": "15.6(3)M1b"
},
{
"status": "affected",
"version": "15.6(3)M2"
},
{
"status": "affected",
"version": "15.6(3)M2a"
},
{
"status": "affected",
"version": "15.6(3)M3"
},
{
"status": "affected",
"version": "15.6(3)M3a"
},
{
"status": "affected",
"version": "15.6(3)M4"
},
{
"status": "affected",
"version": "15.6(3)M5"
},
{
"status": "affected",
"version": "15.6(3)M6"
},
{
"status": "affected",
"version": "15.6(3)M7"
},
{
"status": "affected",
"version": "15.6(3)M6a"
},
{
"status": "affected",
"version": "15.6(3)M6b"
},
{
"status": "affected",
"version": "15.6(3)M8"
},
{
"status": "affected",
"version": "15.6(3)M9"
},
{
"status": "affected",
"version": "15.2(4)EC1"
},
{
"status": "affected",
"version": "15.2(4)EC2"
},
{
"status": "affected",
"version": "15.3(3)JPC"
},
{
"status": "affected",
"version": "15.3(3)JPC1"
},
{
"status": "affected",
"version": "15.3(3)JPC2"
},
{
"status": "affected",
"version": "15.3(3)JPC3"
},
{
"status": "affected",
"version": "15.3(3)JPC5"
},
{
"status": "affected",
"version": "15.3(3)JND"
},
{
"status": "affected",
"version": "15.3(3)JND1"
},
{
"status": "affected",
"version": "15.3(3)JND2"
},
{
"status": "affected",
"version": "15.3(3)JND3"
},
{
"status": "affected",
"version": "15.4(1)SY"
},
{
"status": "affected",
"version": "15.4(1)SY1"
},
{
"status": "affected",
"version": "15.4(1)SY2"
},
{
"status": "affected",
"version": "15.4(1)SY3"
},
{
"status": "affected",
"version": "15.4(1)SY4"
},
{
"status": "affected",
"version": "15.3(3)JE"
},
{
"status": "affected",
"version": "15.3(3)JPD"
},
{
"status": "affected",
"version": "15.3(3)JDA7"
},
{
"status": "affected",
"version": "15.3(3)JDA8"
},
{
"status": "affected",
"version": "15.3(3)JDA9"
},
{
"status": "affected",
"version": "15.3(3)JDA11"
},
{
"status": "affected",
"version": "15.3(3)JDA13"
},
{
"status": "affected",
"version": "15.3(3)JDA14"
},
{
"status": "affected",
"version": "15.3(3)JDA16"
},
{
"status": "affected",
"version": "15.3(3)JDA17"
},
{
"status": "affected",
"version": "15.5(1)SY"
},
{
"status": "affected",
"version": "15.5(1)SY1"
},
{
"status": "affected",
"version": "15.5(1)SY2"
},
{
"status": "affected",
"version": "15.5(1)SY3"
},
{
"status": "affected",
"version": "15.5(1)SY4"
},
{
"status": "affected",
"version": "15.5(1)SY5"
},
{
"status": "affected",
"version": "15.5(1)SY6"
},
{
"status": "affected",
"version": "15.5(1)SY7"
},
{
"status": "affected",
"version": "15.5(1)SY8"
},
{
"status": "affected",
"version": "15.5(1)SY9"
},
{
"status": "affected",
"version": "15.5(1)SY10"
},
{
"status": "affected",
"version": "15.5(1)SY11"
},
{
"status": "affected",
"version": "15.5(1)SY12"
},
{
"status": "affected",
"version": "15.5(1)SY13"
},
{
"status": "affected",
"version": "15.5(1)SY14"
},
{
"status": "affected",
"version": "15.5(1)SY15"
},
{
"status": "affected",
"version": "15.3(3)JF"
},
{
"status": "affected",
"version": "15.3(3)JF1"
},
{
"status": "affected",
"version": "15.3(3)JF2"
},
{
"status": "affected",
"version": "15.3(3)JF4"
},
{
"status": "affected",
"version": "15.3(3)JF5"
},
{
"status": "affected",
"version": "15.3(3)JF6"
},
{
"status": "affected",
"version": "15.3(3)JF7"
},
{
"status": "affected",
"version": "15.3(3)JF8"
},
{
"status": "affected",
"version": "15.3(3)JF9"
},
{
"status": "affected",
"version": "15.3(3)JF10"
},
{
"status": "affected",
"version": "15.3(3)JF11"
},
{
"status": "affected",
"version": "15.3(3)JF12"
},
{
"status": "affected",
"version": "15.3(3)JF12i"
},
{
"status": "affected",
"version": "15.3(3)JF14"
},
{
"status": "affected",
"version": "15.3(3)JF14i"
},
{
"status": "affected",
"version": "15.3(3)JF15"
},
{
"status": "affected",
"version": "15.3(3)JCA7"
},
{
"status": "affected",
"version": "15.3(3)JCA8"
},
{
"status": "affected",
"version": "15.3(3)JCA9"
},
{
"status": "affected",
"version": "15.7(3)M"
},
{
"status": "affected",
"version": "15.7(3)M1"
},
{
"status": "affected",
"version": "15.7(3)M0a"
},
{
"status": "affected",
"version": "15.7(3)M3"
},
{
"status": "affected",
"version": "15.7(3)M2"
},
{
"status": "affected",
"version": "15.7(3)M4"
},
{
"status": "affected",
"version": "15.7(3)M5"
},
{
"status": "affected",
"version": "15.7(3)M4a"
},
{
"status": "affected",
"version": "15.7(3)M4b"
},
{
"status": "affected",
"version": "15.7(3)M6"
},
{
"status": "affected",
"version": "15.7(3)M7"
},
{
"status": "affected",
"version": "15.7(3)M8"
},
{
"status": "affected",
"version": "15.7(3)M9"
},
{
"status": "affected",
"version": "15.3(3)JG"
},
{
"status": "affected",
"version": "15.3(3)JG1"
},
{
"status": "affected",
"version": "15.3(3)JH"
},
{
"status": "affected",
"version": "15.3(3)JH1"
},
{
"status": "affected",
"version": "15.3(3)JI1"
},
{
"status": "affected",
"version": "15.3(3)JI3"
},
{
"status": "affected",
"version": "15.3(3)JI4"
},
{
"status": "affected",
"version": "15.3(3)JI5"
},
{
"status": "affected",
"version": "15.3(3)JI6"
},
{
"status": "affected",
"version": "15.8(3)M"
},
{
"status": "affected",
"version": "15.8(3)M1"
},
{
"status": "affected",
"version": "15.8(3)M0a"
},
{
"status": "affected",
"version": "15.8(3)M0b"
},
{
"status": "affected",
"version": "15.8(3)M2"
},
{
"status": "affected",
"version": "15.8(3)M1a"
},
{
"status": "affected",
"version": "15.8(3)M3"
},
{
"status": "affected",
"version": "15.8(3)M2a"
},
{
"status": "affected",
"version": "15.8(3)M4"
},
{
"status": "affected",
"version": "15.8(3)M3a"
},
{
"status": "affected",
"version": "15.8(3)M3b"
},
{
"status": "affected",
"version": "15.8(3)M5"
},
{
"status": "affected",
"version": "15.8(3)M6"
},
{
"status": "affected",
"version": "15.8(3)M7"
},
{
"status": "affected",
"version": "15.8(3)M8"
},
{
"status": "affected",
"version": "15.8(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M"
},
{
"status": "affected",
"version": "15.9(3)M1"
},
{
"status": "affected",
"version": "15.9(3)M0a"
},
{
"status": "affected",
"version": "15.9(3)M2"
},
{
"status": "affected",
"version": "15.9(3)M3"
},
{
"status": "affected",
"version": "15.9(3)M2a"
},
{
"status": "affected",
"version": "15.9(3)M3a"
},
{
"status": "affected",
"version": "15.9(3)M4"
},
{
"status": "affected",
"version": "15.9(3)M3b"
},
{
"status": "affected",
"version": "15.9(3)M5"
},
{
"status": "affected",
"version": "15.9(3)M4a"
},
{
"status": "affected",
"version": "15.9(3)M6"
},
{
"status": "affected",
"version": "15.9(3)M7"
},
{
"status": "affected",
"version": "15.9(3)M6a"
},
{
"status": "affected",
"version": "15.9(3)M6b"
},
{
"status": "affected",
"version": "15.9(3)M8"
},
{
"status": "affected",
"version": "15.9(3)M7a"
},
{
"status": "affected",
"version": "15.9(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M8b"
},
{
"status": "affected",
"version": "15.9(3)M10"
},
{
"status": "affected",
"version": "15.9(3)M11"
},
{
"status": "affected",
"version": "15.3(3)JK"
},
{
"status": "affected",
"version": "15.3(3)JK1"
},
{
"status": "affected",
"version": "15.3(3)JK2"
},
{
"status": "affected",
"version": "15.3(3)JK3"
},
{
"status": "affected",
"version": "15.3(3)JK2a"
},
{
"status": "affected",
"version": "15.3(3)JK1t"
},
{
"status": "affected",
"version": "15.3(3)JK4"
},
{
"status": "affected",
"version": "15.3(3)JK5"
},
{
"status": "affected",
"version": "15.3(3)JK6"
},
{
"status": "affected",
"version": "15.3(3)JK7"
},
{
"status": "affected",
"version": "15.3(3)JK8"
},
{
"status": "affected",
"version": "15.3(3)JK8a"
},
{
"status": "affected",
"version": "15.3(3)JK8b"
},
{
"status": "affected",
"version": "15.3(3)JK9"
},
{
"status": "affected",
"version": "15.3(3)JK10"
},
{
"status": "affected",
"version": "15.3(3)JK11"
},
{
"status": "affected",
"version": "15.3(3)JJ"
},
{
"status": "affected",
"version": "15.3(3)JJ1"
},
{
"status": "affected",
"version": "15.3(3)JPI1"
},
{
"status": "affected",
"version": "15.3(3)JPI4"
},
{
"status": "affected",
"version": "15.3(3)JPI1t"
},
{
"status": "affected",
"version": "15.3(3)JPI5"
},
{
"status": "affected",
"version": "15.3(3)JPI7"
},
{
"status": "affected",
"version": "15.3(3)JPI6a"
},
{
"status": "affected",
"version": "15.3(3)JPI8a"
},
{
"status": "affected",
"version": "15.3(3)JPI9"
},
{
"status": "affected",
"version": "15.3(3)JPI10"
},
{
"status": "affected",
"version": "15.3(3)JPJ2"
},
{
"status": "affected",
"version": "15.3(3)JPJ3"
},
{
"status": "affected",
"version": "15.3(3)JPJ2t"
},
{
"status": "affected",
"version": "15.3(3)JPJ3a"
},
{
"status": "affected",
"version": "15.3(3)JPJ4"
},
{
"status": "affected",
"version": "15.3(3)JPJ5"
},
{
"status": "affected",
"version": "15.3(3)JPJ6"
},
{
"status": "affected",
"version": "15.3(3)JPJ7"
},
{
"status": "affected",
"version": "15.3(3)JPJ7c"
},
{
"status": "affected",
"version": "15.3(3)JPJ8a"
},
{
"status": "affected",
"version": "15.3(3)JPJ9"
},
{
"status": "affected",
"version": "15.3(3)JPJ10"
},
{
"status": "affected",
"version": "15.3(3)JPJ11"
},
{
"status": "affected",
"version": "15.3(3)JPK"
},
{
"status": "affected",
"version": "15.3(3)JPK1"
},
{
"status": "affected",
"version": "15.3(3)JPK2"
},
{
"status": "affected",
"version": "15.3(3)JPK3"
},
{
"status": "affected",
"version": "15.3(3)JPK4"
},
{
"status": "affected",
"version": "15.3(3)JPK5"
},
{
"status": "affected",
"version": "15.3(3)JPK6"
},
{
"status": "affected",
"version": "15.3(3)JPK7"
},
{
"status": "affected",
"version": "15.3(3)JPK8"
},
{
"status": "affected",
"version": "15.3(3)JPK9"
},
{
"status": "affected",
"version": "15.3(3)JPL"
},
{
"status": "affected",
"version": "15.3(3)JPM"
},
{
"status": "affected",
"version": "15.3(3)JPN"
},
{
"status": "affected",
"version": "15.3(3)JPN1"
},
{
"status": "affected",
"version": "15.3(3)JPN2"
},
{
"status": "affected",
"version": "15.3(3)JPN3"
},
{
"status": "affected",
"version": "15.3(3)JPN4"
},
{
"status": "affected",
"version": "15.3(3)JPN5"
},
{
"status": "affected",
"version": "15.3(3)JPN6"
},
{
"status": "affected",
"version": "15.3(3)JPO"
},
{
"status": "affected",
"version": "15.3(3)JPP"
},
{
"status": "affected",
"version": "15.3(3)JPQ"
},
{
"status": "affected",
"version": "15.3(3)JPQ1"
},
{
"status": "affected",
"version": "15.3(3)JPQ2"
},
{
"status": "affected",
"version": "15.3(3)JPQ3"
},
{
"status": "affected",
"version": "15.3(3)JPQ4"
},
{
"status": "affected",
"version": "15.3(3)JPQ5"
},
{
"status": "affected",
"version": "15.3(3)JPR"
},
{
"status": "affected",
"version": "15.3(3)JPS"
},
{
"status": "affected",
"version": "15.3(3)JPT"
},
{
"status": "affected",
"version": "15.3(3)JPT1"
},
{
"status": "affected",
"version": "15.3(3)JPT2"
}
]
},
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.2aS"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.3aS"
},
{
"status": "affected",
"version": "3.16.4S"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.16.6S"
},
{
"status": "affected",
"version": "3.16.7S"
},
{
"status": "affected",
"version": "3.16.6bS"
},
{
"status": "affected",
"version": "3.16.7aS"
},
{
"status": "affected",
"version": "3.16.7bS"
},
{
"status": "affected",
"version": "3.16.8S"
},
{
"status": "affected",
"version": "3.16.9S"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "3.17.4S"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.8.8E"
},
{
"status": "affected",
"version": "3.8.9E"
},
{
"status": "affected",
"version": "3.8.10E"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.2S"
},
{
"status": "affected",
"version": "3.18.3S"
},
{
"status": "affected",
"version": "3.18.4S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.1bSP"
},
{
"status": "affected",
"version": "3.18.1cSP"
},
{
"status": "affected",
"version": "3.18.2SP"
},
{
"status": "affected",
"version": "3.18.2aSP"
},
{
"status": "affected",
"version": "3.18.3SP"
},
{
"status": "affected",
"version": "3.18.4SP"
},
{
"status": "affected",
"version": "3.18.3aSP"
},
{
"status": "affected",
"version": "3.18.3bSP"
},
{
"status": "affected",
"version": "3.18.5SP"
},
{
"status": "affected",
"version": "3.18.6SP"
},
{
"status": "affected",
"version": "3.18.7SP"
},
{
"status": "affected",
"version": "3.18.8aSP"
},
{
"status": "affected",
"version": "3.18.9SP"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.2E"
},
{
"status": "affected",
"version": "3.10.3E"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "16.12.13"
},
{
"status": "affected",
"version": "3.11.0E"
},
{
"status": "affected",
"version": "3.11.1E"
},
{
"status": "affected",
"version": "3.11.2E"
},
{
"status": "affected",
"version": "3.11.3E"
},
{
"status": "affected",
"version": "3.11.1aE"
},
{
"status": "affected",
"version": "3.11.4E"
},
{
"status": "affected",
"version": "3.11.3aE"
},
{
"status": "affected",
"version": "3.11.5E"
},
{
"status": "affected",
"version": "3.11.6E"
},
{
"status": "affected",
"version": "3.11.7E"
},
{
"status": "affected",
"version": "3.11.8E"
},
{
"status": "affected",
"version": "3.11.9E"
},
{
"status": "affected",
"version": "3.11.10E"
},
{
"status": "affected",
"version": "3.11.11E"
},
{
"status": "affected",
"version": "3.11.12E"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.7"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.9.7a"
},
{
"status": "affected",
"version": "17.9.7b"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.5"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.12.1z3"
},
{
"status": "affected",
"version": "17.12.5a"
},
{
"status": "affected",
"version": "17.12.1z4"
},
{
"status": "affected",
"version": "17.12.5b"
},
{
"status": "affected",
"version": "17.12.5c"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.15.1z"
},
{
"status": "affected",
"version": "17.15.3"
},
{
"status": "affected",
"version": "17.15.2c"
},
{
"status": "affected",
"version": "17.15.2a"
},
{
"status": "affected",
"version": "17.15.1y"
},
{
"status": "affected",
"version": "17.15.2b"
},
{
"status": "affected",
"version": "17.15.3a"
},
{
"status": "affected",
"version": "17.15.4"
},
{
"status": "affected",
"version": "17.15.3b"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
},
{
"status": "affected",
"version": "17.17.1"
},
{
"status": "affected",
"version": "17.18.1"
}
]
},
{
"product": "Cisco IOS XE Catalyst SD-WAN",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "16.10.3a"
},
{
"status": "affected",
"version": "16.10.3b"
},
{
"status": "affected",
"version": "16.10.4"
},
{
"status": "affected",
"version": "16.10.5"
},
{
"status": "affected",
"version": "16.10.6"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.12.1b"
},
{
"status": "affected",
"version": "16.12.1d"
},
{
"status": "affected",
"version": "16.12.1e"
},
{
"status": "affected",
"version": "16.12.2r"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) became aware of successful exploitation of this vulnerability in the wild after local Administrator credentials were compromised. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-30T16:18:05.082Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-snmp-x4LPhte",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"
}
],
"source": {
"advisory": "cisco-sa-snmp-x4LPhte",
"defects": [
"CSCwq31287"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20352",
"datePublished": "2025-09-24T17:10:42.891Z",
"dateReserved": "2024-10-10T19:15:13.257Z",
"dateUpdated": "2025-10-21T22:45:17.376Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20195 (GCVE-0-2025-20195)
Vulnerability from cvelistv5 ā Published: 2025-05-07 17:49 ā Updated: 2025-05-07 19:39
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a CSRF attack and execute commands on the CLI of an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to clear the syslog, parser, and licensing logs on the affected device if the targeted user has privileges to clear those logs.
Severity ?
4.3 (Medium)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
16.1.1
Affected: 16.1.2 Affected: 16.1.3 Affected: 16.2.1 Affected: 16.2.2 Affected: 16.3.1 Affected: 16.3.2 Affected: 16.3.3 Affected: 16.3.1a Affected: 16.3.4 Affected: 16.3.5 Affected: 16.3.5b Affected: 16.3.6 Affected: 16.3.7 Affected: 16.3.8 Affected: 16.3.9 Affected: 16.3.10 Affected: 16.3.11 Affected: 16.4.1 Affected: 16.4.2 Affected: 16.4.3 Affected: 16.5.1 Affected: 16.5.1a Affected: 16.5.1b Affected: 16.5.2 Affected: 16.5.3 Affected: 16.6.1 Affected: 16.6.2 Affected: 16.6.3 Affected: 16.6.4 Affected: 16.6.5 Affected: 16.6.4a Affected: 16.6.5a Affected: 16.6.6 Affected: 16.6.7 Affected: 16.6.8 Affected: 16.6.9 Affected: 16.6.10 Affected: 16.7.1 Affected: 16.7.1a Affected: 16.7.1b Affected: 16.7.2 Affected: 16.7.3 Affected: 16.7.4 Affected: 16.8.1 Affected: 16.8.1a Affected: 16.8.1b Affected: 16.8.1s Affected: 16.8.1c Affected: 16.8.1d Affected: 16.8.2 Affected: 16.8.1e Affected: 16.8.3 Affected: 16.9.1 Affected: 16.9.2 Affected: 16.9.1a Affected: 16.9.1b Affected: 16.9.1s Affected: 16.9.3 Affected: 16.9.4 Affected: 16.9.3a Affected: 16.9.5 Affected: 16.9.5f Affected: 16.9.6 Affected: 16.9.7 Affected: 16.9.8 Affected: 16.10.1 Affected: 16.10.1a Affected: 16.10.1b Affected: 16.10.1s Affected: 16.10.1c Affected: 16.10.1e Affected: 16.10.1d Affected: 16.10.2 Affected: 16.10.1f Affected: 16.10.1g Affected: 16.10.3 Affected: 16.11.1 Affected: 16.11.1a Affected: 16.11.1b Affected: 16.11.2 Affected: 16.11.1s Affected: 16.12.1 Affected: 16.12.1s Affected: 16.12.1a Affected: 16.12.1c Affected: 16.12.1w Affected: 16.12.2 Affected: 16.12.1y Affected: 16.12.2a Affected: 16.12.3 Affected: 16.12.8 Affected: 16.12.2s Affected: 16.12.1x Affected: 16.12.1t Affected: 16.12.4 Affected: 16.12.3s Affected: 16.12.3a Affected: 16.12.4a Affected: 16.12.5 Affected: 16.12.6 Affected: 16.12.1z1 Affected: 16.12.5a Affected: 16.12.5b Affected: 16.12.1z2 Affected: 16.12.6a Affected: 16.12.7 Affected: 16.12.9 Affected: 16.12.10 Affected: 16.12.10a Affected: 16.12.11 Affected: 16.12.12 Affected: 17.1.1 Affected: 17.1.1a Affected: 17.1.1s Affected: 17.1.1t Affected: 17.1.3 Affected: 17.2.1 Affected: 17.2.1r Affected: 17.2.1a Affected: 17.2.1v Affected: 17.2.2 Affected: 17.2.3 Affected: 17.3.1 Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.5e Affected: 17.9.5f Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.11.99SW |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20195",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-07T18:55:34.763373Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T19:39:38.235Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "16.1.1"
},
{
"status": "affected",
"version": "16.1.2"
},
{
"status": "affected",
"version": "16.1.3"
},
{
"status": "affected",
"version": "16.2.1"
},
{
"status": "affected",
"version": "16.2.2"
},
{
"status": "affected",
"version": "16.3.1"
},
{
"status": "affected",
"version": "16.3.2"
},
{
"status": "affected",
"version": "16.3.3"
},
{
"status": "affected",
"version": "16.3.1a"
},
{
"status": "affected",
"version": "16.3.4"
},
{
"status": "affected",
"version": "16.3.5"
},
{
"status": "affected",
"version": "16.3.5b"
},
{
"status": "affected",
"version": "16.3.6"
},
{
"status": "affected",
"version": "16.3.7"
},
{
"status": "affected",
"version": "16.3.8"
},
{
"status": "affected",
"version": "16.3.9"
},
{
"status": "affected",
"version": "16.3.10"
},
{
"status": "affected",
"version": "16.3.11"
},
{
"status": "affected",
"version": "16.4.1"
},
{
"status": "affected",
"version": "16.4.2"
},
{
"status": "affected",
"version": "16.4.3"
},
{
"status": "affected",
"version": "16.5.1"
},
{
"status": "affected",
"version": "16.5.1a"
},
{
"status": "affected",
"version": "16.5.1b"
},
{
"status": "affected",
"version": "16.5.2"
},
{
"status": "affected",
"version": "16.5.3"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.11.99SW"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a CSRF attack and execute commands on the CLI of an affected device.\r\n\r\n This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to clear the syslog, parser, and licensing logs on the affected device if the targeted user has privileges to clear those logs."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T17:49:05.346Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-webui-multi-ARNHM4v6",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"source": {
"advisory": "cisco-sa-webui-multi-ARNHM4v6",
"defects": [
"CSCwk23580"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20195",
"datePublished": "2025-05-07T17:49:05.346Z",
"dateReserved": "2024-10-10T19:15:13.227Z",
"dateUpdated": "2025-05-07T19:39:38.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20194 (GCVE-0-2025-20194)
Vulnerability from cvelistv5 ā Published: 2025-05-07 17:48 ā Updated: 2025-05-08 03:56
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read limited files from the underlying operating system or clear the syslog and licensing logs on the affected device.
Severity ?
5.4 (Medium)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
17.3.1
Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.6.8 Affected: 17.6.8a Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.6 Affected: 17.9.6a Affected: 17.9.5e Affected: 17.9.5f Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.4 Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.12.4a Affected: 17.12.4b Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.11.99SW Affected: 17.15.1 Affected: 17.15.1w Affected: 17.15.1a Affected: 17.15.1b |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20194",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-07T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-08T03:56:37.461Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.11.99SW"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.1b"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.\r\n\r\n This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read limited files from the underlying operating system or clear the syslog and licensing logs on the affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T17:48:13.644Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-webui-multi-ARNHM4v6",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"source": {
"advisory": "cisco-sa-webui-multi-ARNHM4v6",
"defects": [
"CSCwk25133"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20194",
"datePublished": "2025-05-07T17:48:13.644Z",
"dateReserved": "2024-10-10T19:15:13.227Z",
"dateUpdated": "2025-05-08T03:56:37.461Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20338 (GCVE-0-2025-20338)
Vulnerability from nvd ā Published: 2025-09-24 17:14 ā Updated: 2025-09-25 03:55
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by logging in to the device CLI with valid administrative (level 15) credentials and using crafted commands at the CLI prompt. A successful exploit could allow the attacker to execute arbitrary commands as root.
Severity ?
6 (Medium)
CWE
- CWE-141 - Improper Neutralization of Parameter/Argument Delimiters
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
3.5.0E
Affected: 3.5.1E Affected: 3.5.2E Affected: 3.5.3E Affected: 3.11.1S Affected: 3.11.2S Affected: 3.11.0S Affected: 3.11.3S Affected: 3.11.4S Affected: 3.12.0S Affected: 3.12.1S Affected: 3.12.2S Affected: 3.12.3S Affected: 3.12.0aS Affected: 3.12.4S Affected: 3.13.0S Affected: 3.13.1S Affected: 3.13.2S Affected: 3.13.3S Affected: 3.13.4S Affected: 3.13.5S Affected: 3.13.2aS Affected: 3.13.0aS Affected: 3.13.5aS Affected: 3.13.6S Affected: 3.13.7S Affected: 3.13.6aS Affected: 3.13.7aS Affected: 3.13.8S Affected: 3.13.9S Affected: 3.13.10S Affected: 3.6.0E Affected: 3.6.1E Affected: 3.6.2aE Affected: 3.6.2E Affected: 3.6.3E Affected: 3.6.4E Affected: 3.6.5E Affected: 3.6.6E Affected: 3.6.5aE Affected: 3.6.7E Affected: 3.6.8E Affected: 3.6.7bE Affected: 3.6.9E Affected: 3.6.10E Affected: 3.14.0S Affected: 3.14.1S Affected: 3.14.2S Affected: 3.14.3S Affected: 3.14.4S Affected: 3.15.0S Affected: 3.15.1S Affected: 3.15.2S Affected: 3.15.1cS Affected: 3.15.3S Affected: 3.15.4S Affected: 3.7.0E Affected: 3.7.1E Affected: 3.7.2E Affected: 3.7.3E Affected: 3.7.4E Affected: 3.7.5E Affected: 3.5.0SQ Affected: 3.5.1SQ Affected: 3.5.2SQ Affected: 3.5.3SQ Affected: 3.5.4SQ Affected: 3.5.5SQ Affected: 3.5.6SQ Affected: 3.5.7SQ Affected: 3.5.8SQ Affected: 3.16.0S Affected: 3.16.1S Affected: 3.16.1aS Affected: 3.16.2S Affected: 3.16.2aS Affected: 3.16.0cS Affected: 3.16.3S Affected: 3.16.2bS Affected: 3.16.3aS Affected: 3.16.4S Affected: 3.16.4aS Affected: 3.16.4bS Affected: 3.16.5S Affected: 3.16.4dS Affected: 3.16.6S Affected: 3.16.7S Affected: 3.16.6bS Affected: 3.16.7aS Affected: 3.16.7bS Affected: 3.16.8S Affected: 3.16.9S Affected: 3.16.10S Affected: 3.17.0S Affected: 3.17.1S Affected: 3.17.2S Affected: 3.17.1aS Affected: 3.17.3S Affected: 3.17.4S Affected: 3.8.0E Affected: 3.8.1E Affected: 3.8.2E Affected: 3.8.3E Affected: 3.8.4E Affected: 3.8.5E Affected: 3.8.5aE Affected: 3.8.6E Affected: 3.8.7E Affected: 3.8.8E Affected: 3.8.9E Affected: 3.8.10E Affected: 3.8.10eE Affected: 3.18.0aS Affected: 3.18.0S Affected: 3.18.1S Affected: 3.18.2S Affected: 3.18.3S Affected: 3.18.4S Affected: 3.18.0SP Affected: 3.18.1SP Affected: 3.18.1aSP Affected: 3.18.1bSP Affected: 3.18.1cSP Affected: 3.18.2SP Affected: 3.18.2aSP Affected: 3.18.3SP Affected: 3.18.4SP Affected: 3.18.3aSP Affected: 3.18.3bSP Affected: 3.18.5SP Affected: 3.18.6SP Affected: 3.18.7SP Affected: 3.18.8aSP Affected: 3.18.9SP Affected: 3.9.0E Affected: 3.9.1E Affected: 3.9.2E Affected: 16.6.1 Affected: 16.6.2 Affected: 16.6.3 Affected: 16.6.4 Affected: 16.6.5 Affected: 16.6.4a Affected: 16.6.5a Affected: 16.6.6 Affected: 16.6.7 Affected: 16.6.8 Affected: 16.6.9 Affected: 16.6.10 Affected: 16.7.1 Affected: 16.7.1a Affected: 16.7.1b Affected: 16.7.2 Affected: 16.7.3 Affected: 16.7.4 Affected: 16.8.1 Affected: 16.8.1a Affected: 16.8.1b Affected: 16.8.1s Affected: 16.8.1c Affected: 16.8.1d Affected: 16.8.2 Affected: 16.8.1e Affected: 16.8.3 Affected: 16.9.1 Affected: 16.9.2 Affected: 16.9.1a Affected: 16.9.1b Affected: 16.9.1s Affected: 16.9.3 Affected: 16.9.4 Affected: 16.9.3a Affected: 16.9.5 Affected: 16.9.5f Affected: 16.9.6 Affected: 16.9.7 Affected: 16.9.8 Affected: 16.10.1 Affected: 16.10.1a Affected: 16.10.1b Affected: 16.10.1s Affected: 16.10.1c Affected: 16.10.1e Affected: 16.10.1d Affected: 16.10.2 Affected: 16.10.1f Affected: 16.10.1g Affected: 16.10.3 Affected: 3.10.0E Affected: 3.10.1E Affected: 3.10.0cE Affected: 3.10.2E Affected: 3.10.3E Affected: 16.11.1 Affected: 16.11.1a Affected: 16.11.1b Affected: 16.11.2 Affected: 16.11.1s Affected: 16.12.1 Affected: 16.12.1s Affected: 16.12.1a Affected: 16.12.1c Affected: 16.12.1w Affected: 16.12.2 Affected: 16.12.1y Affected: 16.12.2a Affected: 16.12.3 Affected: 16.12.8 Affected: 16.12.2s Affected: 16.12.1x Affected: 16.12.1t Affected: 16.12.4 Affected: 16.12.3s Affected: 16.12.3a Affected: 16.12.4a Affected: 16.12.5 Affected: 16.12.6 Affected: 16.12.1z1 Affected: 16.12.5a Affected: 16.12.5b Affected: 16.12.1z2 Affected: 16.12.6a Affected: 16.12.7 Affected: 16.12.9 Affected: 16.12.10 Affected: 16.12.10a Affected: 16.12.11 Affected: 16.12.12 Affected: 16.12.13 Affected: 3.11.0E Affected: 3.11.1E Affected: 3.11.2E Affected: 3.11.3E Affected: 3.11.1aE Affected: 3.11.4E Affected: 3.11.3aE Affected: 3.11.5E Affected: 3.11.6E Affected: 3.11.7E Affected: 3.11.8E Affected: 3.11.9E Affected: 3.11.10E Affected: 3.11.11E Affected: 3.11.12E Affected: 17.1.1 Affected: 17.1.1a Affected: 17.1.1s Affected: 17.1.1t Affected: 17.1.3 Affected: 17.2.1 Affected: 17.2.1r Affected: 17.2.1a Affected: 17.2.1v Affected: 17.2.2 Affected: 17.2.3 Affected: 17.3.1 Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.6.8 Affected: 17.6.8a Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.6 Affected: 17.9.6a Affected: 17.9.7 Affected: 17.9.5e Affected: 17.9.5f Affected: 17.9.7a Affected: 17.9.7b Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.4 Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.12.1z2 Affected: 17.12.4a Affected: 17.12.5 Affected: 17.12.4b Affected: 17.12.1z3 Affected: 17.12.5a Affected: 17.12.1z4 Affected: 17.12.5b Affected: 17.12.5c Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.15.1 Affected: 17.15.1w Affected: 17.15.1a Affected: 17.15.2 Affected: 17.15.1b Affected: 17.15.1x Affected: 17.15.1z Affected: 17.15.3 Affected: 17.15.2c Affected: 17.15.2a Affected: 17.15.1y Affected: 17.15.2b Affected: 17.15.3a Affected: 17.15.3b Affected: 17.16.1 Affected: 17.16.1a |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20338",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-24T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-25T03:55:59.105Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.11.1S"
},
{
"status": "affected",
"version": "3.11.2S"
},
{
"status": "affected",
"version": "3.11.0S"
},
{
"status": "affected",
"version": "3.11.3S"
},
{
"status": "affected",
"version": "3.11.4S"
},
{
"status": "affected",
"version": "3.12.0S"
},
{
"status": "affected",
"version": "3.12.1S"
},
{
"status": "affected",
"version": "3.12.2S"
},
{
"status": "affected",
"version": "3.12.3S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.12.4S"
},
{
"status": "affected",
"version": "3.13.0S"
},
{
"status": "affected",
"version": "3.13.1S"
},
{
"status": "affected",
"version": "3.13.2S"
},
{
"status": "affected",
"version": "3.13.3S"
},
{
"status": "affected",
"version": "3.13.4S"
},
{
"status": "affected",
"version": "3.13.5S"
},
{
"status": "affected",
"version": "3.13.2aS"
},
{
"status": "affected",
"version": "3.13.0aS"
},
{
"status": "affected",
"version": "3.13.5aS"
},
{
"status": "affected",
"version": "3.13.6S"
},
{
"status": "affected",
"version": "3.13.7S"
},
{
"status": "affected",
"version": "3.13.6aS"
},
{
"status": "affected",
"version": "3.13.7aS"
},
{
"status": "affected",
"version": "3.13.8S"
},
{
"status": "affected",
"version": "3.13.9S"
},
{
"status": "affected",
"version": "3.13.10S"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.2aS"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.3aS"
},
{
"status": "affected",
"version": "3.16.4S"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.16.6S"
},
{
"status": "affected",
"version": "3.16.7S"
},
{
"status": "affected",
"version": "3.16.6bS"
},
{
"status": "affected",
"version": "3.16.7aS"
},
{
"status": "affected",
"version": "3.16.7bS"
},
{
"status": "affected",
"version": "3.16.8S"
},
{
"status": "affected",
"version": "3.16.9S"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "3.17.4S"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.8.8E"
},
{
"status": "affected",
"version": "3.8.9E"
},
{
"status": "affected",
"version": "3.8.10E"
},
{
"status": "affected",
"version": "3.8.10eE"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.2S"
},
{
"status": "affected",
"version": "3.18.3S"
},
{
"status": "affected",
"version": "3.18.4S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.1bSP"
},
{
"status": "affected",
"version": "3.18.1cSP"
},
{
"status": "affected",
"version": "3.18.2SP"
},
{
"status": "affected",
"version": "3.18.2aSP"
},
{
"status": "affected",
"version": "3.18.3SP"
},
{
"status": "affected",
"version": "3.18.4SP"
},
{
"status": "affected",
"version": "3.18.3aSP"
},
{
"status": "affected",
"version": "3.18.3bSP"
},
{
"status": "affected",
"version": "3.18.5SP"
},
{
"status": "affected",
"version": "3.18.6SP"
},
{
"status": "affected",
"version": "3.18.7SP"
},
{
"status": "affected",
"version": "3.18.8aSP"
},
{
"status": "affected",
"version": "3.18.9SP"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.2E"
},
{
"status": "affected",
"version": "3.10.3E"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "16.12.13"
},
{
"status": "affected",
"version": "3.11.0E"
},
{
"status": "affected",
"version": "3.11.1E"
},
{
"status": "affected",
"version": "3.11.2E"
},
{
"status": "affected",
"version": "3.11.3E"
},
{
"status": "affected",
"version": "3.11.1aE"
},
{
"status": "affected",
"version": "3.11.4E"
},
{
"status": "affected",
"version": "3.11.3aE"
},
{
"status": "affected",
"version": "3.11.5E"
},
{
"status": "affected",
"version": "3.11.6E"
},
{
"status": "affected",
"version": "3.11.7E"
},
{
"status": "affected",
"version": "3.11.8E"
},
{
"status": "affected",
"version": "3.11.9E"
},
{
"status": "affected",
"version": "3.11.10E"
},
{
"status": "affected",
"version": "3.11.11E"
},
{
"status": "affected",
"version": "3.11.12E"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.7"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.9.7a"
},
{
"status": "affected",
"version": "17.9.7b"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.5"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.12.1z3"
},
{
"status": "affected",
"version": "17.12.5a"
},
{
"status": "affected",
"version": "17.12.1z4"
},
{
"status": "affected",
"version": "17.12.5b"
},
{
"status": "affected",
"version": "17.12.5c"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.15.1z"
},
{
"status": "affected",
"version": "17.15.3"
},
{
"status": "affected",
"version": "17.15.2c"
},
{
"status": "affected",
"version": "17.15.2a"
},
{
"status": "affected",
"version": "17.15.1y"
},
{
"status": "affected",
"version": "17.15.2b"
},
{
"status": "affected",
"version": "17.15.3a"
},
{
"status": "affected",
"version": "17.15.3b"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by logging in to the device CLI with valid administrative (level 15) credentials and using crafted commands at the CLI prompt. A successful exploit could allow the attacker to execute arbitrary commands as root."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-141",
"description": "Improper Neutralization of Parameter/Argument Delimiters",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-24T17:14:57.638Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxe-arg-inject-EyDDbh4e",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arg-inject-EyDDbh4e"
}
],
"source": {
"advisory": "cisco-sa-iosxe-arg-inject-EyDDbh4e",
"defects": [
"CSCwm41327"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20338",
"datePublished": "2025-09-24T17:14:57.638Z",
"dateReserved": "2024-10-10T19:15:13.255Z",
"dateUpdated": "2025-09-25T03:55:59.105Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20352 (GCVE-0-2025-20352)
Vulnerability from nvd ā Published: 2025-09-24 17:10 ā Updated: 2025-10-21 22:45
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:
An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials.
An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device.
An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks.
This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.
Note: This vulnerability affects all versions of SNMP.
Severity ?
7.7 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | IOS |
Affected:
12.2(55)SE
Affected: 12.2(55)SE3 Affected: 12.2(55)SE2 Affected: 12.2(58)SE Affected: 12.2(55)SE1 Affected: 12.2(58)SE1 Affected: 12.2(55)SE4 Affected: 12.2(58)SE2 Affected: 12.2(55)SE5 Affected: 12.2(55)SE6 Affected: 12.2(55)SE7 Affected: 12.2(55)SE8 Affected: 12.2(55)SE9 Affected: 12.2(55)SE10 Affected: 12.2(55)SE11 Affected: 12.2(55)SE12 Affected: 12.2(55)SE13 Affected: 12.2(58)EZ Affected: 12.2(53)EZ Affected: 12.2(55)EZ Affected: 12.2(60)EZ Affected: 12.2(60)EZ1 Affected: 12.2(60)EZ2 Affected: 12.2(60)EZ3 Affected: 12.2(60)EZ4 Affected: 12.2(60)EZ5 Affected: 12.2(60)EZ6 Affected: 12.2(60)EZ7 Affected: 12.2(60)EZ8 Affected: 12.2(60)EZ9 Affected: 12.2(60)EZ10 Affected: 12.2(60)EZ11 Affected: 12.2(60)EZ12 Affected: 12.2(60)EZ13 Affected: 12.2(60)EZ14 Affected: 12.2(60)EZ15 Affected: 12.2(33)SXI2 Affected: 12.2(33)SXI3 Affected: 12.2(33)SXI5 Affected: 12.2(33)SXI4a Affected: 12.2(33)SXI4 Affected: 12.2(33)SXI2a Affected: 12.2(33)SXI Affected: 12.2(33)SXI6 Affected: 12.2(33)SXI7 Affected: 12.2(33)SXI1 Affected: 12.2(33)SXI8 Affected: 12.2(33)SXI9 Affected: 12.2(33)SXI8a Affected: 12.2(33)SXI10 Affected: 12.2(33)SXI11 Affected: 12.2(33)SXI12 Affected: 12.2(33)SXI13 Affected: 12.2(33)SXI14 Affected: 12.2(50)SQ2 Affected: 12.2(50)SQ1 Affected: 12.2(50)SQ Affected: 12.2(50)SQ3 Affected: 12.2(50)SQ4 Affected: 12.2(50)SQ5 Affected: 12.2(50)SQ6 Affected: 12.2(50)SQ7 Affected: 15.3(1)T Affected: 15.3(2)T Affected: 15.3(1)T1 Affected: 15.3(1)T2 Affected: 15.3(1)T3 Affected: 15.3(1)T4 Affected: 15.3(2)T1 Affected: 15.3(2)T2 Affected: 15.3(2)T3 Affected: 15.3(2)T4 Affected: 15.0(1)EY Affected: 15.0(1)EY1 Affected: 15.0(1)EY2 Affected: 15.0(2)EY Affected: 15.0(2)EY1 Affected: 15.0(2)EY2 Affected: 15.0(2)EY3 Affected: 15.0(1)SE Affected: 15.0(2)SE Affected: 15.0(1)SE1 Affected: 15.0(1)SE2 Affected: 15.0(1)SE3 Affected: 15.0(2)SE1 Affected: 15.0(2)SE2 Affected: 15.0(2)SE3 Affected: 15.0(2)SE4 Affected: 15.0(2)SE5 Affected: 15.0(2)SE6 Affected: 15.0(2)SE7 Affected: 15.0(2)SE8 Affected: 15.0(2)SE9 Affected: 15.0(2)SE10 Affected: 15.0(2)SE11 Affected: 15.0(2)SE10a Affected: 15.0(2)SE12 Affected: 15.0(2)SE13 Affected: 15.0(1)SY Affected: 15.0(1)SY1 Affected: 15.0(1)SY2 Affected: 15.0(1)SY3 Affected: 15.0(1)SY4 Affected: 15.0(1)SY5 Affected: 15.0(1)SY6 Affected: 15.0(1)SY7 Affected: 15.0(1)SY8 Affected: 15.0(1)SY7a Affected: 15.0(1)SY9 Affected: 15.0(1)SY10 Affected: 12.2(33)SXJ Affected: 12.2(33)SXJ1 Affected: 12.2(33)SXJ2 Affected: 12.2(33)SXJ3 Affected: 12.2(33)SXJ4 Affected: 12.2(33)SXJ5 Affected: 12.2(33)SXJ6 Affected: 12.2(33)SXJ7 Affected: 12.2(33)SXJ8 Affected: 12.2(33)SXJ9 Affected: 12.2(33)SXJ10 Affected: 15.1(1)SG Affected: 15.1(2)SG Affected: 15.1(1)SG1 Affected: 15.1(1)SG2 Affected: 15.1(2)SG1 Affected: 15.1(2)SG2 Affected: 15.1(2)SG3 Affected: 15.1(2)SG4 Affected: 15.1(2)SG5 Affected: 15.1(2)SG6 Affected: 15.1(2)SG7 Affected: 15.1(2)SG8 Affected: 15.2(4)M Affected: 15.2(4)M1 Affected: 15.2(4)M2 Affected: 15.2(4)M4 Affected: 15.2(4)M3 Affected: 15.2(4)M5 Affected: 15.2(4)M8 Affected: 15.2(4)M10 Affected: 15.2(4)M7 Affected: 15.2(4)M6 Affected: 15.2(4)M9 Affected: 15.2(4)M6a Affected: 15.2(4)M11 Affected: 15.0(2)SG Affected: 15.0(2)SG1 Affected: 15.0(2)SG2 Affected: 15.0(2)SG3 Affected: 15.0(2)SG4 Affected: 15.0(2)SG5 Affected: 15.0(2)SG6 Affected: 15.0(2)SG7 Affected: 15.0(2)SG8 Affected: 15.0(2)SG9 Affected: 15.0(2)SG10 Affected: 15.0(2)SG11 Affected: 15.2(2)GC Affected: 15.2(3)GC Affected: 15.2(3)GC1 Affected: 15.2(4)GC Affected: 15.2(4)GC1 Affected: 15.2(4)GC2 Affected: 15.2(4)GC3 Affected: 15.1(1)SY Affected: 15.1(1)SY1 Affected: 15.1(2)SY Affected: 15.1(2)SY1 Affected: 15.1(2)SY2 Affected: 15.1(1)SY2 Affected: 15.1(1)SY3 Affected: 15.1(2)SY3 Affected: 15.1(1)SY4 Affected: 15.1(2)SY4 Affected: 15.1(1)SY5 Affected: 15.1(2)SY5 Affected: 15.1(2)SY4a Affected: 15.1(1)SY6 Affected: 15.1(2)SY6 Affected: 15.1(2)SY7 Affected: 15.1(2)SY8 Affected: 15.1(2)SY9 Affected: 15.1(2)SY10 Affected: 15.1(2)SY11 Affected: 15.1(2)SY12 Affected: 15.1(2)SY13 Affected: 15.1(2)SY14 Affected: 15.1(2)SY15 Affected: 15.1(2)SY16 Affected: 15.4(1)T Affected: 15.4(2)T Affected: 15.4(1)T2 Affected: 15.4(1)T1 Affected: 15.4(1)T3 Affected: 15.4(2)T1 Affected: 15.4(2)T3 Affected: 15.4(2)T2 Affected: 15.4(1)T4 Affected: 15.4(2)T4 Affected: 15.0(2)EA Affected: 15.0(2)EA1 Affected: 15.2(1)E Affected: 15.2(2)E Affected: 15.2(1)E1 Affected: 15.2(3)E Affected: 15.2(1)E2 Affected: 15.2(1)E3 Affected: 15.2(2)E1 Affected: 15.2(4)E Affected: 15.2(3)E1 Affected: 15.2(2)E2 Affected: 15.2(2a)E1 Affected: 15.2(2)E3 Affected: 15.2(2a)E2 Affected: 15.2(3)E2 Affected: 15.2(3a)E Affected: 15.2(3)E3 Affected: 15.2(4)E1 Affected: 15.2(2)E4 Affected: 15.2(2)E5 Affected: 15.2(4)E2 Affected: 15.2(3)E4 Affected: 15.2(5)E Affected: 15.2(4)E3 Affected: 15.2(2)E6 Affected: 15.2(5a)E Affected: 15.2(5)E1 Affected: 15.2(5b)E Affected: 15.2(2)E5a Affected: 15.2(5c)E Affected: 15.2(2)E5b Affected: 15.2(5a)E1 Affected: 15.2(4)E4 Affected: 15.2(2)E7 Affected: 15.2(5)E2 Affected: 15.2(6)E Affected: 15.2(4)E5 Affected: 15.2(5)E2c Affected: 15.2(2)E8 Affected: 15.2(6)E0a Affected: 15.2(6)E1 Affected: 15.2(6)E0c Affected: 15.2(4)E6 Affected: 15.2(6)E2 Affected: 15.2(2)E9 Affected: 15.2(4)E7 Affected: 15.2(7)E Affected: 15.2(2)E10 Affected: 15.2(4)E8 Affected: 15.2(6)E2a Affected: 15.2(6)E2b Affected: 15.2(7)E1 Affected: 15.2(7)E0a Affected: 15.2(7)E0b Affected: 15.2(7)E0s Affected: 15.2(6)E3 Affected: 15.2(4)E9 Affected: 15.2(7)E2 Affected: 15.2(7a)E0b Affected: 15.2(4)E10 Affected: 15.2(7)E3 Affected: 15.2(7)E1a Affected: 15.2(7b)E0b Affected: 15.2(7)E2a Affected: 15.2(4)E10a Affected: 15.2(7)E4 Affected: 15.2(7)E3k Affected: 15.2(8)E Affected: 15.2(8)E1 Affected: 15.2(7)E5 Affected: 15.2(7)E6 Affected: 15.2(8)E2 Affected: 15.2(4)E10d Affected: 15.2(7)E7 Affected: 15.2(8)E3 Affected: 15.2(7)E8 Affected: 15.2(8)E4 Affected: 15.2(7)E9 Affected: 15.2(8)E5 Affected: 15.2(8)E6 Affected: 15.2(7)E10 Affected: 15.2(7)E11 Affected: 15.2(8)E7 Affected: 15.2(7)E12 Affected: 15.2(2)JB Affected: 15.2(2)JB2 Affected: 15.2(4)JB Affected: 15.2(2)JB3 Affected: 15.2(4)JB1 Affected: 15.2(4)JB2 Affected: 15.2(4)JB3 Affected: 15.2(4)JB3a Affected: 15.2(2)JB4 Affected: 15.2(4)JB4 Affected: 15.2(4)JB3h Affected: 15.2(4)JB3b Affected: 15.2(4)JB5 Affected: 15.2(4)JB6 Affected: 15.2(2)JB5 Affected: 15.2(2)JB6 Affected: 15.2(2)JAX Affected: 15.3(3)M Affected: 15.3(3)M1 Affected: 15.3(3)M2 Affected: 15.3(3)M3 Affected: 15.3(3)M5 Affected: 15.3(3)M4 Affected: 15.3(3)M6 Affected: 15.3(3)M7 Affected: 15.3(3)M8 Affected: 15.3(3)M9 Affected: 15.3(3)M10 Affected: 15.3(3)M8a Affected: 15.2(4)JN Affected: 15.2(1)EY Affected: 15.0(2)EJ Affected: 15.0(2)EJ1 Affected: 15.2(1)SY Affected: 15.2(1)SY1 Affected: 15.2(1)SY0a Affected: 15.2(1)SY2 Affected: 15.2(2)SY Affected: 15.2(1)SY1a Affected: 15.2(2)SY1 Affected: 15.2(2)SY2 Affected: 15.2(1)SY3 Affected: 15.2(1)SY4 Affected: 15.2(2)SY3 Affected: 15.2(1)SY5 Affected: 15.2(1)SY6 Affected: 15.2(1)SY7 Affected: 15.2(1)SY8 Affected: 15.2(5)EX Affected: 15.0(2)EK Affected: 15.0(2)EK1 Affected: 15.4(1)CG Affected: 15.4(1)CG1 Affected: 15.4(2)CG Affected: 15.5(1)S Affected: 15.5(2)S Affected: 15.5(1)S1 Affected: 15.5(3)S Affected: 15.5(1)S2 Affected: 15.5(1)S3 Affected: 15.5(2)S1 Affected: 15.5(2)S2 Affected: 15.5(3)S1 Affected: 15.5(3)S1a Affected: 15.5(2)S3 Affected: 15.5(3)S2 Affected: 15.5(3)S0a Affected: 15.5(3)S3 Affected: 15.5(1)S4 Affected: 15.5(2)S4 Affected: 15.5(3)S4 Affected: 15.5(3)S5 Affected: 15.5(3)S6 Affected: 15.5(3)S6a Affected: 15.5(3)S7 Affected: 15.5(3)S6b Affected: 15.5(3)S8 Affected: 15.5(3)S9 Affected: 15.5(3)S10 Affected: 15.5(3)S9a Affected: 15.5(1)T Affected: 15.5(1)T1 Affected: 15.5(2)T Affected: 15.5(1)T2 Affected: 15.5(1)T3 Affected: 15.5(2)T1 Affected: 15.5(2)T2 Affected: 15.5(2)T3 Affected: 15.5(2)T4 Affected: 15.5(1)T4 Affected: 15.2(2)EA Affected: 15.2(2)EA1 Affected: 15.2(2)EA2 Affected: 15.2(3)EA Affected: 15.2(4)EA Affected: 15.2(4)EA1 Affected: 15.2(2)EA3 Affected: 15.2(4)EA3 Affected: 15.2(5)EA Affected: 15.2(4)EA4 Affected: 15.2(4)EA5 Affected: 15.2(4)EA6 Affected: 15.2(4)EA7 Affected: 15.2(4)EA8 Affected: 15.2(4)EA9 Affected: 15.2(4)EA9a Affected: 15.3(3)JN3 Affected: 15.3(3)JN4 Affected: 15.3(3)JN7 Affected: 15.3(3)JN8 Affected: 15.3(3)JN9 Affected: 15.5(3)M Affected: 15.5(3)M1 Affected: 15.5(3)M0a Affected: 15.5(3)M2 Affected: 15.5(3)M3 Affected: 15.5(3)M4 Affected: 15.5(3)M4a Affected: 15.5(3)M5 Affected: 15.5(3)M6 Affected: 15.5(3)M7 Affected: 15.5(3)M6a Affected: 15.5(3)M8 Affected: 15.5(3)M9 Affected: 15.5(3)M10 Affected: 15.3(3)JA1m Affected: 15.3(3)JA1 Affected: 15.3(3)JA4 Affected: 15.3(3)JA5 Affected: 15.3(3)JA6 Affected: 15.3(3)JA7 Affected: 15.3(3)JA8 Affected: 15.3(3)JA10 Affected: 15.3(3)JA11 Affected: 15.3(3)JA12 Affected: 15.3(3)JAA Affected: 15.3(3)JAA11 Affected: 15.3(3)JAA12 Affected: 15.3(3)JAB Affected: 15.3(3)JB Affected: 15.5(3)SN Affected: 15.0(2)SQD Affected: 15.0(2)SQD1 Affected: 15.0(2)SQD2 Affected: 15.0(2)SQD3 Affected: 15.0(2)SQD4 Affected: 15.0(2)SQD5 Affected: 15.0(2)SQD6 Affected: 15.0(2)SQD7 Affected: 15.0(2)SQD8 Affected: 15.6(1)S Affected: 15.6(2)S Affected: 15.6(2)S1 Affected: 15.6(1)S1 Affected: 15.6(1)S2 Affected: 15.6(2)S2 Affected: 15.6(1)S3 Affected: 15.6(2)S3 Affected: 15.6(1)S4 Affected: 15.6(2)S4 Affected: 15.6(1)T Affected: 15.6(2)T Affected: 15.6(1)T0a Affected: 15.6(1)T1 Affected: 15.6(2)T1 Affected: 15.6(1)T2 Affected: 15.6(2)T2 Affected: 15.6(1)T3 Affected: 15.6(2)T3 Affected: 15.3(3)JNB Affected: 15.3(3)JNB1 Affected: 15.3(3)JNB2 Affected: 15.3(3)JNB3 Affected: 15.3(3)JNB4 Affected: 15.3(3)JNB6 Affected: 15.3(3)JNB5 Affected: 15.3(3)JAX Affected: 15.3(3)JAX1 Affected: 15.3(3)JAX2 Affected: 15.3(3)JBB Affected: 15.3(3)JBB1 Affected: 15.3(3)JBB2 Affected: 15.3(3)JBB4 Affected: 15.3(3)JBB5 Affected: 15.3(3)JBB6 Affected: 15.3(3)JBB8 Affected: 15.3(3)JBB6a Affected: 15.3(3)JC Affected: 15.3(3)JC1 Affected: 15.3(3)JC2 Affected: 15.3(3)JC3 Affected: 15.3(3)JC4 Affected: 15.3(3)JC5 Affected: 15.3(3)JC6 Affected: 15.3(3)JC8 Affected: 15.3(3)JC9 Affected: 15.3(3)JC14 Affected: 15.3(1)SY Affected: 15.3(1)SY1 Affected: 15.3(1)SY2 Affected: 15.3(3)JNC Affected: 15.3(3)JNC1 Affected: 15.3(3)JNC4 Affected: 15.3(3)JNP Affected: 15.3(3)JNP1 Affected: 15.3(3)JNP3 Affected: 15.6(2)SP Affected: 15.6(2)SP1 Affected: 15.6(2)SP2 Affected: 15.6(2)SP3 Affected: 15.6(2)SP4 Affected: 15.6(2)SP5 Affected: 15.6(2)SP6 Affected: 15.6(2)SP7 Affected: 15.6(2)SP8 Affected: 15.6(2)SP9 Affected: 15.6(2)SN Affected: 15.3(3)JPB Affected: 15.3(3)JPB1 Affected: 15.3(3)JD Affected: 15.3(3)JD2 Affected: 15.3(3)JD3 Affected: 15.3(3)JD4 Affected: 15.3(3)JD5 Affected: 15.3(3)JD6 Affected: 15.3(3)JD7 Affected: 15.3(3)JD8 Affected: 15.3(3)JD9 Affected: 15.3(3)JD11 Affected: 15.3(3)JD13 Affected: 15.3(3)JD14 Affected: 15.3(3)JD16 Affected: 15.3(3)JD17 Affected: 15.6(3)M Affected: 15.6(3)M1 Affected: 15.6(3)M0a Affected: 15.6(3)M1b Affected: 15.6(3)M2 Affected: 15.6(3)M2a Affected: 15.6(3)M3 Affected: 15.6(3)M3a Affected: 15.6(3)M4 Affected: 15.6(3)M5 Affected: 15.6(3)M6 Affected: 15.6(3)M7 Affected: 15.6(3)M6a Affected: 15.6(3)M6b Affected: 15.6(3)M8 Affected: 15.6(3)M9 Affected: 15.2(4)EC1 Affected: 15.2(4)EC2 Affected: 15.3(3)JPC Affected: 15.3(3)JPC1 Affected: 15.3(3)JPC2 Affected: 15.3(3)JPC3 Affected: 15.3(3)JPC5 Affected: 15.3(3)JND Affected: 15.3(3)JND1 Affected: 15.3(3)JND2 Affected: 15.3(3)JND3 Affected: 15.4(1)SY Affected: 15.4(1)SY1 Affected: 15.4(1)SY2 Affected: 15.4(1)SY3 Affected: 15.4(1)SY4 Affected: 15.3(3)JE Affected: 15.3(3)JPD Affected: 15.3(3)JDA7 Affected: 15.3(3)JDA8 Affected: 15.3(3)JDA9 Affected: 15.3(3)JDA11 Affected: 15.3(3)JDA13 Affected: 15.3(3)JDA14 Affected: 15.3(3)JDA16 Affected: 15.3(3)JDA17 Affected: 15.5(1)SY Affected: 15.5(1)SY1 Affected: 15.5(1)SY2 Affected: 15.5(1)SY3 Affected: 15.5(1)SY4 Affected: 15.5(1)SY5 Affected: 15.5(1)SY6 Affected: 15.5(1)SY7 Affected: 15.5(1)SY8 Affected: 15.5(1)SY9 Affected: 15.5(1)SY10 Affected: 15.5(1)SY11 Affected: 15.5(1)SY12 Affected: 15.5(1)SY13 Affected: 15.5(1)SY14 Affected: 15.5(1)SY15 Affected: 15.3(3)JF Affected: 15.3(3)JF1 Affected: 15.3(3)JF2 Affected: 15.3(3)JF4 Affected: 15.3(3)JF5 Affected: 15.3(3)JF6 Affected: 15.3(3)JF7 Affected: 15.3(3)JF8 Affected: 15.3(3)JF9 Affected: 15.3(3)JF10 Affected: 15.3(3)JF11 Affected: 15.3(3)JF12 Affected: 15.3(3)JF12i Affected: 15.3(3)JF14 Affected: 15.3(3)JF14i Affected: 15.3(3)JF15 Affected: 15.3(3)JCA7 Affected: 15.3(3)JCA8 Affected: 15.3(3)JCA9 Affected: 15.7(3)M Affected: 15.7(3)M1 Affected: 15.7(3)M0a Affected: 15.7(3)M3 Affected: 15.7(3)M2 Affected: 15.7(3)M4 Affected: 15.7(3)M5 Affected: 15.7(3)M4a Affected: 15.7(3)M4b Affected: 15.7(3)M6 Affected: 15.7(3)M7 Affected: 15.7(3)M8 Affected: 15.7(3)M9 Affected: 15.3(3)JG Affected: 15.3(3)JG1 Affected: 15.3(3)JH Affected: 15.3(3)JH1 Affected: 15.3(3)JI1 Affected: 15.3(3)JI3 Affected: 15.3(3)JI4 Affected: 15.3(3)JI5 Affected: 15.3(3)JI6 Affected: 15.8(3)M Affected: 15.8(3)M1 Affected: 15.8(3)M0a Affected: 15.8(3)M0b Affected: 15.8(3)M2 Affected: 15.8(3)M1a Affected: 15.8(3)M3 Affected: 15.8(3)M2a Affected: 15.8(3)M4 Affected: 15.8(3)M3a Affected: 15.8(3)M3b Affected: 15.8(3)M5 Affected: 15.8(3)M6 Affected: 15.8(3)M7 Affected: 15.8(3)M8 Affected: 15.8(3)M9 Affected: 15.9(3)M Affected: 15.9(3)M1 Affected: 15.9(3)M0a Affected: 15.9(3)M2 Affected: 15.9(3)M3 Affected: 15.9(3)M2a Affected: 15.9(3)M3a Affected: 15.9(3)M4 Affected: 15.9(3)M3b Affected: 15.9(3)M5 Affected: 15.9(3)M4a Affected: 15.9(3)M6 Affected: 15.9(3)M7 Affected: 15.9(3)M6a Affected: 15.9(3)M6b Affected: 15.9(3)M8 Affected: 15.9(3)M7a Affected: 15.9(3)M9 Affected: 15.9(3)M8b Affected: 15.9(3)M10 Affected: 15.9(3)M11 Affected: 15.3(3)JK Affected: 15.3(3)JK1 Affected: 15.3(3)JK2 Affected: 15.3(3)JK3 Affected: 15.3(3)JK2a Affected: 15.3(3)JK1t Affected: 15.3(3)JK4 Affected: 15.3(3)JK5 Affected: 15.3(3)JK6 Affected: 15.3(3)JK7 Affected: 15.3(3)JK8 Affected: 15.3(3)JK8a Affected: 15.3(3)JK8b Affected: 15.3(3)JK9 Affected: 15.3(3)JK10 Affected: 15.3(3)JK11 Affected: 15.3(3)JJ Affected: 15.3(3)JJ1 Affected: 15.3(3)JPI1 Affected: 15.3(3)JPI4 Affected: 15.3(3)JPI1t Affected: 15.3(3)JPI5 Affected: 15.3(3)JPI7 Affected: 15.3(3)JPI6a Affected: 15.3(3)JPI8a Affected: 15.3(3)JPI9 Affected: 15.3(3)JPI10 Affected: 15.3(3)JPJ2 Affected: 15.3(3)JPJ3 Affected: 15.3(3)JPJ2t Affected: 15.3(3)JPJ3a Affected: 15.3(3)JPJ4 Affected: 15.3(3)JPJ5 Affected: 15.3(3)JPJ6 Affected: 15.3(3)JPJ7 Affected: 15.3(3)JPJ7c Affected: 15.3(3)JPJ8a Affected: 15.3(3)JPJ9 Affected: 15.3(3)JPJ10 Affected: 15.3(3)JPJ11 Affected: 15.3(3)JPK Affected: 15.3(3)JPK1 Affected: 15.3(3)JPK2 Affected: 15.3(3)JPK3 Affected: 15.3(3)JPK4 Affected: 15.3(3)JPK5 Affected: 15.3(3)JPK6 Affected: 15.3(3)JPK7 Affected: 15.3(3)JPK8 Affected: 15.3(3)JPK9 Affected: 15.3(3)JPL Affected: 15.3(3)JPM Affected: 15.3(3)JPN Affected: 15.3(3)JPN1 Affected: 15.3(3)JPN2 Affected: 15.3(3)JPN3 Affected: 15.3(3)JPN4 Affected: 15.3(3)JPN5 Affected: 15.3(3)JPN6 Affected: 15.3(3)JPO Affected: 15.3(3)JPP Affected: 15.3(3)JPQ Affected: 15.3(3)JPQ1 Affected: 15.3(3)JPQ2 Affected: 15.3(3)JPQ3 Affected: 15.3(3)JPQ4 Affected: 15.3(3)JPQ5 Affected: 15.3(3)JPR Affected: 15.3(3)JPS Affected: 15.3(3)JPT Affected: 15.3(3)JPT1 Affected: 15.3(3)JPT2 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20352",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-27T03:55:24.975809Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-09-29",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T22:45:17.376Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-09-29T00:00:00+00:00",
"value": "CVE-2025-20352 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "12.2(55)SE"
},
{
"status": "affected",
"version": "12.2(55)SE3"
},
{
"status": "affected",
"version": "12.2(55)SE2"
},
{
"status": "affected",
"version": "12.2(58)SE"
},
{
"status": "affected",
"version": "12.2(55)SE1"
},
{
"status": "affected",
"version": "12.2(58)SE1"
},
{
"status": "affected",
"version": "12.2(55)SE4"
},
{
"status": "affected",
"version": "12.2(58)SE2"
},
{
"status": "affected",
"version": "12.2(55)SE5"
},
{
"status": "affected",
"version": "12.2(55)SE6"
},
{
"status": "affected",
"version": "12.2(55)SE7"
},
{
"status": "affected",
"version": "12.2(55)SE8"
},
{
"status": "affected",
"version": "12.2(55)SE9"
},
{
"status": "affected",
"version": "12.2(55)SE10"
},
{
"status": "affected",
"version": "12.2(55)SE11"
},
{
"status": "affected",
"version": "12.2(55)SE12"
},
{
"status": "affected",
"version": "12.2(55)SE13"
},
{
"status": "affected",
"version": "12.2(58)EZ"
},
{
"status": "affected",
"version": "12.2(53)EZ"
},
{
"status": "affected",
"version": "12.2(55)EZ"
},
{
"status": "affected",
"version": "12.2(60)EZ"
},
{
"status": "affected",
"version": "12.2(60)EZ1"
},
{
"status": "affected",
"version": "12.2(60)EZ2"
},
{
"status": "affected",
"version": "12.2(60)EZ3"
},
{
"status": "affected",
"version": "12.2(60)EZ4"
},
{
"status": "affected",
"version": "12.2(60)EZ5"
},
{
"status": "affected",
"version": "12.2(60)EZ6"
},
{
"status": "affected",
"version": "12.2(60)EZ7"
},
{
"status": "affected",
"version": "12.2(60)EZ8"
},
{
"status": "affected",
"version": "12.2(60)EZ9"
},
{
"status": "affected",
"version": "12.2(60)EZ10"
},
{
"status": "affected",
"version": "12.2(60)EZ11"
},
{
"status": "affected",
"version": "12.2(60)EZ12"
},
{
"status": "affected",
"version": "12.2(60)EZ13"
},
{
"status": "affected",
"version": "12.2(60)EZ14"
},
{
"status": "affected",
"version": "12.2(60)EZ15"
},
{
"status": "affected",
"version": "12.2(33)SXI2"
},
{
"status": "affected",
"version": "12.2(33)SXI3"
},
{
"status": "affected",
"version": "12.2(33)SXI5"
},
{
"status": "affected",
"version": "12.2(33)SXI4a"
},
{
"status": "affected",
"version": "12.2(33)SXI4"
},
{
"status": "affected",
"version": "12.2(33)SXI2a"
},
{
"status": "affected",
"version": "12.2(33)SXI"
},
{
"status": "affected",
"version": "12.2(33)SXI6"
},
{
"status": "affected",
"version": "12.2(33)SXI7"
},
{
"status": "affected",
"version": "12.2(33)SXI1"
},
{
"status": "affected",
"version": "12.2(33)SXI8"
},
{
"status": "affected",
"version": "12.2(33)SXI9"
},
{
"status": "affected",
"version": "12.2(33)SXI8a"
},
{
"status": "affected",
"version": "12.2(33)SXI10"
},
{
"status": "affected",
"version": "12.2(33)SXI11"
},
{
"status": "affected",
"version": "12.2(33)SXI12"
},
{
"status": "affected",
"version": "12.2(33)SXI13"
},
{
"status": "affected",
"version": "12.2(33)SXI14"
},
{
"status": "affected",
"version": "12.2(50)SQ2"
},
{
"status": "affected",
"version": "12.2(50)SQ1"
},
{
"status": "affected",
"version": "12.2(50)SQ"
},
{
"status": "affected",
"version": "12.2(50)SQ3"
},
{
"status": "affected",
"version": "12.2(50)SQ4"
},
{
"status": "affected",
"version": "12.2(50)SQ5"
},
{
"status": "affected",
"version": "12.2(50)SQ6"
},
{
"status": "affected",
"version": "12.2(50)SQ7"
},
{
"status": "affected",
"version": "15.3(1)T"
},
{
"status": "affected",
"version": "15.3(2)T"
},
{
"status": "affected",
"version": "15.3(1)T1"
},
{
"status": "affected",
"version": "15.3(1)T2"
},
{
"status": "affected",
"version": "15.3(1)T3"
},
{
"status": "affected",
"version": "15.3(1)T4"
},
{
"status": "affected",
"version": "15.3(2)T1"
},
{
"status": "affected",
"version": "15.3(2)T2"
},
{
"status": "affected",
"version": "15.3(2)T3"
},
{
"status": "affected",
"version": "15.3(2)T4"
},
{
"status": "affected",
"version": "15.0(1)EY"
},
{
"status": "affected",
"version": "15.0(1)EY1"
},
{
"status": "affected",
"version": "15.0(1)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY"
},
{
"status": "affected",
"version": "15.0(2)EY1"
},
{
"status": "affected",
"version": "15.0(2)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY3"
},
{
"status": "affected",
"version": "15.0(1)SE"
},
{
"status": "affected",
"version": "15.0(2)SE"
},
{
"status": "affected",
"version": "15.0(1)SE1"
},
{
"status": "affected",
"version": "15.0(1)SE2"
},
{
"status": "affected",
"version": "15.0(1)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE1"
},
{
"status": "affected",
"version": "15.0(2)SE2"
},
{
"status": "affected",
"version": "15.0(2)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE4"
},
{
"status": "affected",
"version": "15.0(2)SE5"
},
{
"status": "affected",
"version": "15.0(2)SE6"
},
{
"status": "affected",
"version": "15.0(2)SE7"
},
{
"status": "affected",
"version": "15.0(2)SE8"
},
{
"status": "affected",
"version": "15.0(2)SE9"
},
{
"status": "affected",
"version": "15.0(2)SE10"
},
{
"status": "affected",
"version": "15.0(2)SE11"
},
{
"status": "affected",
"version": "15.0(2)SE10a"
},
{
"status": "affected",
"version": "15.0(2)SE12"
},
{
"status": "affected",
"version": "15.0(2)SE13"
},
{
"status": "affected",
"version": "15.0(1)SY"
},
{
"status": "affected",
"version": "15.0(1)SY1"
},
{
"status": "affected",
"version": "15.0(1)SY2"
},
{
"status": "affected",
"version": "15.0(1)SY3"
},
{
"status": "affected",
"version": "15.0(1)SY4"
},
{
"status": "affected",
"version": "15.0(1)SY5"
},
{
"status": "affected",
"version": "15.0(1)SY6"
},
{
"status": "affected",
"version": "15.0(1)SY7"
},
{
"status": "affected",
"version": "15.0(1)SY8"
},
{
"status": "affected",
"version": "15.0(1)SY7a"
},
{
"status": "affected",
"version": "15.0(1)SY9"
},
{
"status": "affected",
"version": "15.0(1)SY10"
},
{
"status": "affected",
"version": "12.2(33)SXJ"
},
{
"status": "affected",
"version": "12.2(33)SXJ1"
},
{
"status": "affected",
"version": "12.2(33)SXJ2"
},
{
"status": "affected",
"version": "12.2(33)SXJ3"
},
{
"status": "affected",
"version": "12.2(33)SXJ4"
},
{
"status": "affected",
"version": "12.2(33)SXJ5"
},
{
"status": "affected",
"version": "12.2(33)SXJ6"
},
{
"status": "affected",
"version": "12.2(33)SXJ7"
},
{
"status": "affected",
"version": "12.2(33)SXJ8"
},
{
"status": "affected",
"version": "12.2(33)SXJ9"
},
{
"status": "affected",
"version": "12.2(33)SXJ10"
},
{
"status": "affected",
"version": "15.1(1)SG"
},
{
"status": "affected",
"version": "15.1(2)SG"
},
{
"status": "affected",
"version": "15.1(1)SG1"
},
{
"status": "affected",
"version": "15.1(1)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG1"
},
{
"status": "affected",
"version": "15.1(2)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG3"
},
{
"status": "affected",
"version": "15.1(2)SG4"
},
{
"status": "affected",
"version": "15.1(2)SG5"
},
{
"status": "affected",
"version": "15.1(2)SG6"
},
{
"status": "affected",
"version": "15.1(2)SG7"
},
{
"status": "affected",
"version": "15.1(2)SG8"
},
{
"status": "affected",
"version": "15.2(4)M"
},
{
"status": "affected",
"version": "15.2(4)M1"
},
{
"status": "affected",
"version": "15.2(4)M2"
},
{
"status": "affected",
"version": "15.2(4)M4"
},
{
"status": "affected",
"version": "15.2(4)M3"
},
{
"status": "affected",
"version": "15.2(4)M5"
},
{
"status": "affected",
"version": "15.2(4)M8"
},
{
"status": "affected",
"version": "15.2(4)M10"
},
{
"status": "affected",
"version": "15.2(4)M7"
},
{
"status": "affected",
"version": "15.2(4)M6"
},
{
"status": "affected",
"version": "15.2(4)M9"
},
{
"status": "affected",
"version": "15.2(4)M6a"
},
{
"status": "affected",
"version": "15.2(4)M11"
},
{
"status": "affected",
"version": "15.0(2)SG"
},
{
"status": "affected",
"version": "15.0(2)SG1"
},
{
"status": "affected",
"version": "15.0(2)SG2"
},
{
"status": "affected",
"version": "15.0(2)SG3"
},
{
"status": "affected",
"version": "15.0(2)SG4"
},
{
"status": "affected",
"version": "15.0(2)SG5"
},
{
"status": "affected",
"version": "15.0(2)SG6"
},
{
"status": "affected",
"version": "15.0(2)SG7"
},
{
"status": "affected",
"version": "15.0(2)SG8"
},
{
"status": "affected",
"version": "15.0(2)SG9"
},
{
"status": "affected",
"version": "15.0(2)SG10"
},
{
"status": "affected",
"version": "15.0(2)SG11"
},
{
"status": "affected",
"version": "15.2(2)GC"
},
{
"status": "affected",
"version": "15.2(3)GC"
},
{
"status": "affected",
"version": "15.2(3)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC"
},
{
"status": "affected",
"version": "15.2(4)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC2"
},
{
"status": "affected",
"version": "15.2(4)GC3"
},
{
"status": "affected",
"version": "15.1(1)SY"
},
{
"status": "affected",
"version": "15.1(1)SY1"
},
{
"status": "affected",
"version": "15.1(2)SY"
},
{
"status": "affected",
"version": "15.1(2)SY1"
},
{
"status": "affected",
"version": "15.1(2)SY2"
},
{
"status": "affected",
"version": "15.1(1)SY2"
},
{
"status": "affected",
"version": "15.1(1)SY3"
},
{
"status": "affected",
"version": "15.1(2)SY3"
},
{
"status": "affected",
"version": "15.1(1)SY4"
},
{
"status": "affected",
"version": "15.1(2)SY4"
},
{
"status": "affected",
"version": "15.1(1)SY5"
},
{
"status": "affected",
"version": "15.1(2)SY5"
},
{
"status": "affected",
"version": "15.1(2)SY4a"
},
{
"status": "affected",
"version": "15.1(1)SY6"
},
{
"status": "affected",
"version": "15.1(2)SY6"
},
{
"status": "affected",
"version": "15.1(2)SY7"
},
{
"status": "affected",
"version": "15.1(2)SY8"
},
{
"status": "affected",
"version": "15.1(2)SY9"
},
{
"status": "affected",
"version": "15.1(2)SY10"
},
{
"status": "affected",
"version": "15.1(2)SY11"
},
{
"status": "affected",
"version": "15.1(2)SY12"
},
{
"status": "affected",
"version": "15.1(2)SY13"
},
{
"status": "affected",
"version": "15.1(2)SY14"
},
{
"status": "affected",
"version": "15.1(2)SY15"
},
{
"status": "affected",
"version": "15.1(2)SY16"
},
{
"status": "affected",
"version": "15.4(1)T"
},
{
"status": "affected",
"version": "15.4(2)T"
},
{
"status": "affected",
"version": "15.4(1)T2"
},
{
"status": "affected",
"version": "15.4(1)T1"
},
{
"status": "affected",
"version": "15.4(1)T3"
},
{
"status": "affected",
"version": "15.4(2)T1"
},
{
"status": "affected",
"version": "15.4(2)T3"
},
{
"status": "affected",
"version": "15.4(2)T2"
},
{
"status": "affected",
"version": "15.4(1)T4"
},
{
"status": "affected",
"version": "15.4(2)T4"
},
{
"status": "affected",
"version": "15.0(2)EA"
},
{
"status": "affected",
"version": "15.0(2)EA1"
},
{
"status": "affected",
"version": "15.2(1)E"
},
{
"status": "affected",
"version": "15.2(2)E"
},
{
"status": "affected",
"version": "15.2(1)E1"
},
{
"status": "affected",
"version": "15.2(3)E"
},
{
"status": "affected",
"version": "15.2(1)E2"
},
{
"status": "affected",
"version": "15.2(1)E3"
},
{
"status": "affected",
"version": "15.2(2)E1"
},
{
"status": "affected",
"version": "15.2(4)E"
},
{
"status": "affected",
"version": "15.2(3)E1"
},
{
"status": "affected",
"version": "15.2(2)E2"
},
{
"status": "affected",
"version": "15.2(2a)E1"
},
{
"status": "affected",
"version": "15.2(2)E3"
},
{
"status": "affected",
"version": "15.2(2a)E2"
},
{
"status": "affected",
"version": "15.2(3)E2"
},
{
"status": "affected",
"version": "15.2(3a)E"
},
{
"status": "affected",
"version": "15.2(3)E3"
},
{
"status": "affected",
"version": "15.2(4)E1"
},
{
"status": "affected",
"version": "15.2(2)E4"
},
{
"status": "affected",
"version": "15.2(2)E5"
},
{
"status": "affected",
"version": "15.2(4)E2"
},
{
"status": "affected",
"version": "15.2(3)E4"
},
{
"status": "affected",
"version": "15.2(5)E"
},
{
"status": "affected",
"version": "15.2(4)E3"
},
{
"status": "affected",
"version": "15.2(2)E6"
},
{
"status": "affected",
"version": "15.2(5a)E"
},
{
"status": "affected",
"version": "15.2(5)E1"
},
{
"status": "affected",
"version": "15.2(5b)E"
},
{
"status": "affected",
"version": "15.2(2)E5a"
},
{
"status": "affected",
"version": "15.2(5c)E"
},
{
"status": "affected",
"version": "15.2(2)E5b"
},
{
"status": "affected",
"version": "15.2(5a)E1"
},
{
"status": "affected",
"version": "15.2(4)E4"
},
{
"status": "affected",
"version": "15.2(2)E7"
},
{
"status": "affected",
"version": "15.2(5)E2"
},
{
"status": "affected",
"version": "15.2(6)E"
},
{
"status": "affected",
"version": "15.2(4)E5"
},
{
"status": "affected",
"version": "15.2(5)E2c"
},
{
"status": "affected",
"version": "15.2(2)E8"
},
{
"status": "affected",
"version": "15.2(6)E0a"
},
{
"status": "affected",
"version": "15.2(6)E1"
},
{
"status": "affected",
"version": "15.2(6)E0c"
},
{
"status": "affected",
"version": "15.2(4)E6"
},
{
"status": "affected",
"version": "15.2(6)E2"
},
{
"status": "affected",
"version": "15.2(2)E9"
},
{
"status": "affected",
"version": "15.2(4)E7"
},
{
"status": "affected",
"version": "15.2(7)E"
},
{
"status": "affected",
"version": "15.2(2)E10"
},
{
"status": "affected",
"version": "15.2(4)E8"
},
{
"status": "affected",
"version": "15.2(6)E2a"
},
{
"status": "affected",
"version": "15.2(6)E2b"
},
{
"status": "affected",
"version": "15.2(7)E1"
},
{
"status": "affected",
"version": "15.2(7)E0a"
},
{
"status": "affected",
"version": "15.2(7)E0b"
},
{
"status": "affected",
"version": "15.2(7)E0s"
},
{
"status": "affected",
"version": "15.2(6)E3"
},
{
"status": "affected",
"version": "15.2(4)E9"
},
{
"status": "affected",
"version": "15.2(7)E2"
},
{
"status": "affected",
"version": "15.2(7a)E0b"
},
{
"status": "affected",
"version": "15.2(4)E10"
},
{
"status": "affected",
"version": "15.2(7)E3"
},
{
"status": "affected",
"version": "15.2(7)E1a"
},
{
"status": "affected",
"version": "15.2(7b)E0b"
},
{
"status": "affected",
"version": "15.2(7)E2a"
},
{
"status": "affected",
"version": "15.2(4)E10a"
},
{
"status": "affected",
"version": "15.2(7)E4"
},
{
"status": "affected",
"version": "15.2(7)E3k"
},
{
"status": "affected",
"version": "15.2(8)E"
},
{
"status": "affected",
"version": "15.2(8)E1"
},
{
"status": "affected",
"version": "15.2(7)E5"
},
{
"status": "affected",
"version": "15.2(7)E6"
},
{
"status": "affected",
"version": "15.2(8)E2"
},
{
"status": "affected",
"version": "15.2(4)E10d"
},
{
"status": "affected",
"version": "15.2(7)E7"
},
{
"status": "affected",
"version": "15.2(8)E3"
},
{
"status": "affected",
"version": "15.2(7)E8"
},
{
"status": "affected",
"version": "15.2(8)E4"
},
{
"status": "affected",
"version": "15.2(7)E9"
},
{
"status": "affected",
"version": "15.2(8)E5"
},
{
"status": "affected",
"version": "15.2(8)E6"
},
{
"status": "affected",
"version": "15.2(7)E10"
},
{
"status": "affected",
"version": "15.2(7)E11"
},
{
"status": "affected",
"version": "15.2(8)E7"
},
{
"status": "affected",
"version": "15.2(7)E12"
},
{
"status": "affected",
"version": "15.2(2)JB"
},
{
"status": "affected",
"version": "15.2(2)JB2"
},
{
"status": "affected",
"version": "15.2(4)JB"
},
{
"status": "affected",
"version": "15.2(2)JB3"
},
{
"status": "affected",
"version": "15.2(4)JB1"
},
{
"status": "affected",
"version": "15.2(4)JB2"
},
{
"status": "affected",
"version": "15.2(4)JB3"
},
{
"status": "affected",
"version": "15.2(4)JB3a"
},
{
"status": "affected",
"version": "15.2(2)JB4"
},
{
"status": "affected",
"version": "15.2(4)JB4"
},
{
"status": "affected",
"version": "15.2(4)JB3h"
},
{
"status": "affected",
"version": "15.2(4)JB3b"
},
{
"status": "affected",
"version": "15.2(4)JB5"
},
{
"status": "affected",
"version": "15.2(4)JB6"
},
{
"status": "affected",
"version": "15.2(2)JB5"
},
{
"status": "affected",
"version": "15.2(2)JB6"
},
{
"status": "affected",
"version": "15.2(2)JAX"
},
{
"status": "affected",
"version": "15.3(3)M"
},
{
"status": "affected",
"version": "15.3(3)M1"
},
{
"status": "affected",
"version": "15.3(3)M2"
},
{
"status": "affected",
"version": "15.3(3)M3"
},
{
"status": "affected",
"version": "15.3(3)M5"
},
{
"status": "affected",
"version": "15.3(3)M4"
},
{
"status": "affected",
"version": "15.3(3)M6"
},
{
"status": "affected",
"version": "15.3(3)M7"
},
{
"status": "affected",
"version": "15.3(3)M8"
},
{
"status": "affected",
"version": "15.3(3)M9"
},
{
"status": "affected",
"version": "15.3(3)M10"
},
{
"status": "affected",
"version": "15.3(3)M8a"
},
{
"status": "affected",
"version": "15.2(4)JN"
},
{
"status": "affected",
"version": "15.2(1)EY"
},
{
"status": "affected",
"version": "15.0(2)EJ"
},
{
"status": "affected",
"version": "15.0(2)EJ1"
},
{
"status": "affected",
"version": "15.2(1)SY"
},
{
"status": "affected",
"version": "15.2(1)SY1"
},
{
"status": "affected",
"version": "15.2(1)SY0a"
},
{
"status": "affected",
"version": "15.2(1)SY2"
},
{
"status": "affected",
"version": "15.2(2)SY"
},
{
"status": "affected",
"version": "15.2(1)SY1a"
},
{
"status": "affected",
"version": "15.2(2)SY1"
},
{
"status": "affected",
"version": "15.2(2)SY2"
},
{
"status": "affected",
"version": "15.2(1)SY3"
},
{
"status": "affected",
"version": "15.2(1)SY4"
},
{
"status": "affected",
"version": "15.2(2)SY3"
},
{
"status": "affected",
"version": "15.2(1)SY5"
},
{
"status": "affected",
"version": "15.2(1)SY6"
},
{
"status": "affected",
"version": "15.2(1)SY7"
},
{
"status": "affected",
"version": "15.2(1)SY8"
},
{
"status": "affected",
"version": "15.2(5)EX"
},
{
"status": "affected",
"version": "15.0(2)EK"
},
{
"status": "affected",
"version": "15.0(2)EK1"
},
{
"status": "affected",
"version": "15.4(1)CG"
},
{
"status": "affected",
"version": "15.4(1)CG1"
},
{
"status": "affected",
"version": "15.4(2)CG"
},
{
"status": "affected",
"version": "15.5(1)S"
},
{
"status": "affected",
"version": "15.5(2)S"
},
{
"status": "affected",
"version": "15.5(1)S1"
},
{
"status": "affected",
"version": "15.5(3)S"
},
{
"status": "affected",
"version": "15.5(1)S2"
},
{
"status": "affected",
"version": "15.5(1)S3"
},
{
"status": "affected",
"version": "15.5(2)S1"
},
{
"status": "affected",
"version": "15.5(2)S2"
},
{
"status": "affected",
"version": "15.5(3)S1"
},
{
"status": "affected",
"version": "15.5(3)S1a"
},
{
"status": "affected",
"version": "15.5(2)S3"
},
{
"status": "affected",
"version": "15.5(3)S2"
},
{
"status": "affected",
"version": "15.5(3)S0a"
},
{
"status": "affected",
"version": "15.5(3)S3"
},
{
"status": "affected",
"version": "15.5(1)S4"
},
{
"status": "affected",
"version": "15.5(2)S4"
},
{
"status": "affected",
"version": "15.5(3)S4"
},
{
"status": "affected",
"version": "15.5(3)S5"
},
{
"status": "affected",
"version": "15.5(3)S6"
},
{
"status": "affected",
"version": "15.5(3)S6a"
},
{
"status": "affected",
"version": "15.5(3)S7"
},
{
"status": "affected",
"version": "15.5(3)S6b"
},
{
"status": "affected",
"version": "15.5(3)S8"
},
{
"status": "affected",
"version": "15.5(3)S9"
},
{
"status": "affected",
"version": "15.5(3)S10"
},
{
"status": "affected",
"version": "15.5(3)S9a"
},
{
"status": "affected",
"version": "15.5(1)T"
},
{
"status": "affected",
"version": "15.5(1)T1"
},
{
"status": "affected",
"version": "15.5(2)T"
},
{
"status": "affected",
"version": "15.5(1)T2"
},
{
"status": "affected",
"version": "15.5(1)T3"
},
{
"status": "affected",
"version": "15.5(2)T1"
},
{
"status": "affected",
"version": "15.5(2)T2"
},
{
"status": "affected",
"version": "15.5(2)T3"
},
{
"status": "affected",
"version": "15.5(2)T4"
},
{
"status": "affected",
"version": "15.5(1)T4"
},
{
"status": "affected",
"version": "15.2(2)EA"
},
{
"status": "affected",
"version": "15.2(2)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA2"
},
{
"status": "affected",
"version": "15.2(3)EA"
},
{
"status": "affected",
"version": "15.2(4)EA"
},
{
"status": "affected",
"version": "15.2(4)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA3"
},
{
"status": "affected",
"version": "15.2(4)EA3"
},
{
"status": "affected",
"version": "15.2(5)EA"
},
{
"status": "affected",
"version": "15.2(4)EA4"
},
{
"status": "affected",
"version": "15.2(4)EA5"
},
{
"status": "affected",
"version": "15.2(4)EA6"
},
{
"status": "affected",
"version": "15.2(4)EA7"
},
{
"status": "affected",
"version": "15.2(4)EA8"
},
{
"status": "affected",
"version": "15.2(4)EA9"
},
{
"status": "affected",
"version": "15.2(4)EA9a"
},
{
"status": "affected",
"version": "15.3(3)JN3"
},
{
"status": "affected",
"version": "15.3(3)JN4"
},
{
"status": "affected",
"version": "15.3(3)JN7"
},
{
"status": "affected",
"version": "15.3(3)JN8"
},
{
"status": "affected",
"version": "15.3(3)JN9"
},
{
"status": "affected",
"version": "15.5(3)M"
},
{
"status": "affected",
"version": "15.5(3)M1"
},
{
"status": "affected",
"version": "15.5(3)M0a"
},
{
"status": "affected",
"version": "15.5(3)M2"
},
{
"status": "affected",
"version": "15.5(3)M3"
},
{
"status": "affected",
"version": "15.5(3)M4"
},
{
"status": "affected",
"version": "15.5(3)M4a"
},
{
"status": "affected",
"version": "15.5(3)M5"
},
{
"status": "affected",
"version": "15.5(3)M6"
},
{
"status": "affected",
"version": "15.5(3)M7"
},
{
"status": "affected",
"version": "15.5(3)M6a"
},
{
"status": "affected",
"version": "15.5(3)M8"
},
{
"status": "affected",
"version": "15.5(3)M9"
},
{
"status": "affected",
"version": "15.5(3)M10"
},
{
"status": "affected",
"version": "15.3(3)JA1m"
},
{
"status": "affected",
"version": "15.3(3)JA1"
},
{
"status": "affected",
"version": "15.3(3)JA4"
},
{
"status": "affected",
"version": "15.3(3)JA5"
},
{
"status": "affected",
"version": "15.3(3)JA6"
},
{
"status": "affected",
"version": "15.3(3)JA7"
},
{
"status": "affected",
"version": "15.3(3)JA8"
},
{
"status": "affected",
"version": "15.3(3)JA10"
},
{
"status": "affected",
"version": "15.3(3)JA11"
},
{
"status": "affected",
"version": "15.3(3)JA12"
},
{
"status": "affected",
"version": "15.3(3)JAA"
},
{
"status": "affected",
"version": "15.3(3)JAA11"
},
{
"status": "affected",
"version": "15.3(3)JAA12"
},
{
"status": "affected",
"version": "15.3(3)JAB"
},
{
"status": "affected",
"version": "15.3(3)JB"
},
{
"status": "affected",
"version": "15.5(3)SN"
},
{
"status": "affected",
"version": "15.0(2)SQD"
},
{
"status": "affected",
"version": "15.0(2)SQD1"
},
{
"status": "affected",
"version": "15.0(2)SQD2"
},
{
"status": "affected",
"version": "15.0(2)SQD3"
},
{
"status": "affected",
"version": "15.0(2)SQD4"
},
{
"status": "affected",
"version": "15.0(2)SQD5"
},
{
"status": "affected",
"version": "15.0(2)SQD6"
},
{
"status": "affected",
"version": "15.0(2)SQD7"
},
{
"status": "affected",
"version": "15.0(2)SQD8"
},
{
"status": "affected",
"version": "15.6(1)S"
},
{
"status": "affected",
"version": "15.6(2)S"
},
{
"status": "affected",
"version": "15.6(2)S1"
},
{
"status": "affected",
"version": "15.6(1)S1"
},
{
"status": "affected",
"version": "15.6(1)S2"
},
{
"status": "affected",
"version": "15.6(2)S2"
},
{
"status": "affected",
"version": "15.6(1)S3"
},
{
"status": "affected",
"version": "15.6(2)S3"
},
{
"status": "affected",
"version": "15.6(1)S4"
},
{
"status": "affected",
"version": "15.6(2)S4"
},
{
"status": "affected",
"version": "15.6(1)T"
},
{
"status": "affected",
"version": "15.6(2)T"
},
{
"status": "affected",
"version": "15.6(1)T0a"
},
{
"status": "affected",
"version": "15.6(1)T1"
},
{
"status": "affected",
"version": "15.6(2)T1"
},
{
"status": "affected",
"version": "15.6(1)T2"
},
{
"status": "affected",
"version": "15.6(2)T2"
},
{
"status": "affected",
"version": "15.6(1)T3"
},
{
"status": "affected",
"version": "15.6(2)T3"
},
{
"status": "affected",
"version": "15.3(3)JNB"
},
{
"status": "affected",
"version": "15.3(3)JNB1"
},
{
"status": "affected",
"version": "15.3(3)JNB2"
},
{
"status": "affected",
"version": "15.3(3)JNB3"
},
{
"status": "affected",
"version": "15.3(3)JNB4"
},
{
"status": "affected",
"version": "15.3(3)JNB6"
},
{
"status": "affected",
"version": "15.3(3)JNB5"
},
{
"status": "affected",
"version": "15.3(3)JAX"
},
{
"status": "affected",
"version": "15.3(3)JAX1"
},
{
"status": "affected",
"version": "15.3(3)JAX2"
},
{
"status": "affected",
"version": "15.3(3)JBB"
},
{
"status": "affected",
"version": "15.3(3)JBB1"
},
{
"status": "affected",
"version": "15.3(3)JBB2"
},
{
"status": "affected",
"version": "15.3(3)JBB4"
},
{
"status": "affected",
"version": "15.3(3)JBB5"
},
{
"status": "affected",
"version": "15.3(3)JBB6"
},
{
"status": "affected",
"version": "15.3(3)JBB8"
},
{
"status": "affected",
"version": "15.3(3)JBB6a"
},
{
"status": "affected",
"version": "15.3(3)JC"
},
{
"status": "affected",
"version": "15.3(3)JC1"
},
{
"status": "affected",
"version": "15.3(3)JC2"
},
{
"status": "affected",
"version": "15.3(3)JC3"
},
{
"status": "affected",
"version": "15.3(3)JC4"
},
{
"status": "affected",
"version": "15.3(3)JC5"
},
{
"status": "affected",
"version": "15.3(3)JC6"
},
{
"status": "affected",
"version": "15.3(3)JC8"
},
{
"status": "affected",
"version": "15.3(3)JC9"
},
{
"status": "affected",
"version": "15.3(3)JC14"
},
{
"status": "affected",
"version": "15.3(1)SY"
},
{
"status": "affected",
"version": "15.3(1)SY1"
},
{
"status": "affected",
"version": "15.3(1)SY2"
},
{
"status": "affected",
"version": "15.3(3)JNC"
},
{
"status": "affected",
"version": "15.3(3)JNC1"
},
{
"status": "affected",
"version": "15.3(3)JNC4"
},
{
"status": "affected",
"version": "15.3(3)JNP"
},
{
"status": "affected",
"version": "15.3(3)JNP1"
},
{
"status": "affected",
"version": "15.3(3)JNP3"
},
{
"status": "affected",
"version": "15.6(2)SP"
},
{
"status": "affected",
"version": "15.6(2)SP1"
},
{
"status": "affected",
"version": "15.6(2)SP2"
},
{
"status": "affected",
"version": "15.6(2)SP3"
},
{
"status": "affected",
"version": "15.6(2)SP4"
},
{
"status": "affected",
"version": "15.6(2)SP5"
},
{
"status": "affected",
"version": "15.6(2)SP6"
},
{
"status": "affected",
"version": "15.6(2)SP7"
},
{
"status": "affected",
"version": "15.6(2)SP8"
},
{
"status": "affected",
"version": "15.6(2)SP9"
},
{
"status": "affected",
"version": "15.6(2)SN"
},
{
"status": "affected",
"version": "15.3(3)JPB"
},
{
"status": "affected",
"version": "15.3(3)JPB1"
},
{
"status": "affected",
"version": "15.3(3)JD"
},
{
"status": "affected",
"version": "15.3(3)JD2"
},
{
"status": "affected",
"version": "15.3(3)JD3"
},
{
"status": "affected",
"version": "15.3(3)JD4"
},
{
"status": "affected",
"version": "15.3(3)JD5"
},
{
"status": "affected",
"version": "15.3(3)JD6"
},
{
"status": "affected",
"version": "15.3(3)JD7"
},
{
"status": "affected",
"version": "15.3(3)JD8"
},
{
"status": "affected",
"version": "15.3(3)JD9"
},
{
"status": "affected",
"version": "15.3(3)JD11"
},
{
"status": "affected",
"version": "15.3(3)JD13"
},
{
"status": "affected",
"version": "15.3(3)JD14"
},
{
"status": "affected",
"version": "15.3(3)JD16"
},
{
"status": "affected",
"version": "15.3(3)JD17"
},
{
"status": "affected",
"version": "15.6(3)M"
},
{
"status": "affected",
"version": "15.6(3)M1"
},
{
"status": "affected",
"version": "15.6(3)M0a"
},
{
"status": "affected",
"version": "15.6(3)M1b"
},
{
"status": "affected",
"version": "15.6(3)M2"
},
{
"status": "affected",
"version": "15.6(3)M2a"
},
{
"status": "affected",
"version": "15.6(3)M3"
},
{
"status": "affected",
"version": "15.6(3)M3a"
},
{
"status": "affected",
"version": "15.6(3)M4"
},
{
"status": "affected",
"version": "15.6(3)M5"
},
{
"status": "affected",
"version": "15.6(3)M6"
},
{
"status": "affected",
"version": "15.6(3)M7"
},
{
"status": "affected",
"version": "15.6(3)M6a"
},
{
"status": "affected",
"version": "15.6(3)M6b"
},
{
"status": "affected",
"version": "15.6(3)M8"
},
{
"status": "affected",
"version": "15.6(3)M9"
},
{
"status": "affected",
"version": "15.2(4)EC1"
},
{
"status": "affected",
"version": "15.2(4)EC2"
},
{
"status": "affected",
"version": "15.3(3)JPC"
},
{
"status": "affected",
"version": "15.3(3)JPC1"
},
{
"status": "affected",
"version": "15.3(3)JPC2"
},
{
"status": "affected",
"version": "15.3(3)JPC3"
},
{
"status": "affected",
"version": "15.3(3)JPC5"
},
{
"status": "affected",
"version": "15.3(3)JND"
},
{
"status": "affected",
"version": "15.3(3)JND1"
},
{
"status": "affected",
"version": "15.3(3)JND2"
},
{
"status": "affected",
"version": "15.3(3)JND3"
},
{
"status": "affected",
"version": "15.4(1)SY"
},
{
"status": "affected",
"version": "15.4(1)SY1"
},
{
"status": "affected",
"version": "15.4(1)SY2"
},
{
"status": "affected",
"version": "15.4(1)SY3"
},
{
"status": "affected",
"version": "15.4(1)SY4"
},
{
"status": "affected",
"version": "15.3(3)JE"
},
{
"status": "affected",
"version": "15.3(3)JPD"
},
{
"status": "affected",
"version": "15.3(3)JDA7"
},
{
"status": "affected",
"version": "15.3(3)JDA8"
},
{
"status": "affected",
"version": "15.3(3)JDA9"
},
{
"status": "affected",
"version": "15.3(3)JDA11"
},
{
"status": "affected",
"version": "15.3(3)JDA13"
},
{
"status": "affected",
"version": "15.3(3)JDA14"
},
{
"status": "affected",
"version": "15.3(3)JDA16"
},
{
"status": "affected",
"version": "15.3(3)JDA17"
},
{
"status": "affected",
"version": "15.5(1)SY"
},
{
"status": "affected",
"version": "15.5(1)SY1"
},
{
"status": "affected",
"version": "15.5(1)SY2"
},
{
"status": "affected",
"version": "15.5(1)SY3"
},
{
"status": "affected",
"version": "15.5(1)SY4"
},
{
"status": "affected",
"version": "15.5(1)SY5"
},
{
"status": "affected",
"version": "15.5(1)SY6"
},
{
"status": "affected",
"version": "15.5(1)SY7"
},
{
"status": "affected",
"version": "15.5(1)SY8"
},
{
"status": "affected",
"version": "15.5(1)SY9"
},
{
"status": "affected",
"version": "15.5(1)SY10"
},
{
"status": "affected",
"version": "15.5(1)SY11"
},
{
"status": "affected",
"version": "15.5(1)SY12"
},
{
"status": "affected",
"version": "15.5(1)SY13"
},
{
"status": "affected",
"version": "15.5(1)SY14"
},
{
"status": "affected",
"version": "15.5(1)SY15"
},
{
"status": "affected",
"version": "15.3(3)JF"
},
{
"status": "affected",
"version": "15.3(3)JF1"
},
{
"status": "affected",
"version": "15.3(3)JF2"
},
{
"status": "affected",
"version": "15.3(3)JF4"
},
{
"status": "affected",
"version": "15.3(3)JF5"
},
{
"status": "affected",
"version": "15.3(3)JF6"
},
{
"status": "affected",
"version": "15.3(3)JF7"
},
{
"status": "affected",
"version": "15.3(3)JF8"
},
{
"status": "affected",
"version": "15.3(3)JF9"
},
{
"status": "affected",
"version": "15.3(3)JF10"
},
{
"status": "affected",
"version": "15.3(3)JF11"
},
{
"status": "affected",
"version": "15.3(3)JF12"
},
{
"status": "affected",
"version": "15.3(3)JF12i"
},
{
"status": "affected",
"version": "15.3(3)JF14"
},
{
"status": "affected",
"version": "15.3(3)JF14i"
},
{
"status": "affected",
"version": "15.3(3)JF15"
},
{
"status": "affected",
"version": "15.3(3)JCA7"
},
{
"status": "affected",
"version": "15.3(3)JCA8"
},
{
"status": "affected",
"version": "15.3(3)JCA9"
},
{
"status": "affected",
"version": "15.7(3)M"
},
{
"status": "affected",
"version": "15.7(3)M1"
},
{
"status": "affected",
"version": "15.7(3)M0a"
},
{
"status": "affected",
"version": "15.7(3)M3"
},
{
"status": "affected",
"version": "15.7(3)M2"
},
{
"status": "affected",
"version": "15.7(3)M4"
},
{
"status": "affected",
"version": "15.7(3)M5"
},
{
"status": "affected",
"version": "15.7(3)M4a"
},
{
"status": "affected",
"version": "15.7(3)M4b"
},
{
"status": "affected",
"version": "15.7(3)M6"
},
{
"status": "affected",
"version": "15.7(3)M7"
},
{
"status": "affected",
"version": "15.7(3)M8"
},
{
"status": "affected",
"version": "15.7(3)M9"
},
{
"status": "affected",
"version": "15.3(3)JG"
},
{
"status": "affected",
"version": "15.3(3)JG1"
},
{
"status": "affected",
"version": "15.3(3)JH"
},
{
"status": "affected",
"version": "15.3(3)JH1"
},
{
"status": "affected",
"version": "15.3(3)JI1"
},
{
"status": "affected",
"version": "15.3(3)JI3"
},
{
"status": "affected",
"version": "15.3(3)JI4"
},
{
"status": "affected",
"version": "15.3(3)JI5"
},
{
"status": "affected",
"version": "15.3(3)JI6"
},
{
"status": "affected",
"version": "15.8(3)M"
},
{
"status": "affected",
"version": "15.8(3)M1"
},
{
"status": "affected",
"version": "15.8(3)M0a"
},
{
"status": "affected",
"version": "15.8(3)M0b"
},
{
"status": "affected",
"version": "15.8(3)M2"
},
{
"status": "affected",
"version": "15.8(3)M1a"
},
{
"status": "affected",
"version": "15.8(3)M3"
},
{
"status": "affected",
"version": "15.8(3)M2a"
},
{
"status": "affected",
"version": "15.8(3)M4"
},
{
"status": "affected",
"version": "15.8(3)M3a"
},
{
"status": "affected",
"version": "15.8(3)M3b"
},
{
"status": "affected",
"version": "15.8(3)M5"
},
{
"status": "affected",
"version": "15.8(3)M6"
},
{
"status": "affected",
"version": "15.8(3)M7"
},
{
"status": "affected",
"version": "15.8(3)M8"
},
{
"status": "affected",
"version": "15.8(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M"
},
{
"status": "affected",
"version": "15.9(3)M1"
},
{
"status": "affected",
"version": "15.9(3)M0a"
},
{
"status": "affected",
"version": "15.9(3)M2"
},
{
"status": "affected",
"version": "15.9(3)M3"
},
{
"status": "affected",
"version": "15.9(3)M2a"
},
{
"status": "affected",
"version": "15.9(3)M3a"
},
{
"status": "affected",
"version": "15.9(3)M4"
},
{
"status": "affected",
"version": "15.9(3)M3b"
},
{
"status": "affected",
"version": "15.9(3)M5"
},
{
"status": "affected",
"version": "15.9(3)M4a"
},
{
"status": "affected",
"version": "15.9(3)M6"
},
{
"status": "affected",
"version": "15.9(3)M7"
},
{
"status": "affected",
"version": "15.9(3)M6a"
},
{
"status": "affected",
"version": "15.9(3)M6b"
},
{
"status": "affected",
"version": "15.9(3)M8"
},
{
"status": "affected",
"version": "15.9(3)M7a"
},
{
"status": "affected",
"version": "15.9(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M8b"
},
{
"status": "affected",
"version": "15.9(3)M10"
},
{
"status": "affected",
"version": "15.9(3)M11"
},
{
"status": "affected",
"version": "15.3(3)JK"
},
{
"status": "affected",
"version": "15.3(3)JK1"
},
{
"status": "affected",
"version": "15.3(3)JK2"
},
{
"status": "affected",
"version": "15.3(3)JK3"
},
{
"status": "affected",
"version": "15.3(3)JK2a"
},
{
"status": "affected",
"version": "15.3(3)JK1t"
},
{
"status": "affected",
"version": "15.3(3)JK4"
},
{
"status": "affected",
"version": "15.3(3)JK5"
},
{
"status": "affected",
"version": "15.3(3)JK6"
},
{
"status": "affected",
"version": "15.3(3)JK7"
},
{
"status": "affected",
"version": "15.3(3)JK8"
},
{
"status": "affected",
"version": "15.3(3)JK8a"
},
{
"status": "affected",
"version": "15.3(3)JK8b"
},
{
"status": "affected",
"version": "15.3(3)JK9"
},
{
"status": "affected",
"version": "15.3(3)JK10"
},
{
"status": "affected",
"version": "15.3(3)JK11"
},
{
"status": "affected",
"version": "15.3(3)JJ"
},
{
"status": "affected",
"version": "15.3(3)JJ1"
},
{
"status": "affected",
"version": "15.3(3)JPI1"
},
{
"status": "affected",
"version": "15.3(3)JPI4"
},
{
"status": "affected",
"version": "15.3(3)JPI1t"
},
{
"status": "affected",
"version": "15.3(3)JPI5"
},
{
"status": "affected",
"version": "15.3(3)JPI7"
},
{
"status": "affected",
"version": "15.3(3)JPI6a"
},
{
"status": "affected",
"version": "15.3(3)JPI8a"
},
{
"status": "affected",
"version": "15.3(3)JPI9"
},
{
"status": "affected",
"version": "15.3(3)JPI10"
},
{
"status": "affected",
"version": "15.3(3)JPJ2"
},
{
"status": "affected",
"version": "15.3(3)JPJ3"
},
{
"status": "affected",
"version": "15.3(3)JPJ2t"
},
{
"status": "affected",
"version": "15.3(3)JPJ3a"
},
{
"status": "affected",
"version": "15.3(3)JPJ4"
},
{
"status": "affected",
"version": "15.3(3)JPJ5"
},
{
"status": "affected",
"version": "15.3(3)JPJ6"
},
{
"status": "affected",
"version": "15.3(3)JPJ7"
},
{
"status": "affected",
"version": "15.3(3)JPJ7c"
},
{
"status": "affected",
"version": "15.3(3)JPJ8a"
},
{
"status": "affected",
"version": "15.3(3)JPJ9"
},
{
"status": "affected",
"version": "15.3(3)JPJ10"
},
{
"status": "affected",
"version": "15.3(3)JPJ11"
},
{
"status": "affected",
"version": "15.3(3)JPK"
},
{
"status": "affected",
"version": "15.3(3)JPK1"
},
{
"status": "affected",
"version": "15.3(3)JPK2"
},
{
"status": "affected",
"version": "15.3(3)JPK3"
},
{
"status": "affected",
"version": "15.3(3)JPK4"
},
{
"status": "affected",
"version": "15.3(3)JPK5"
},
{
"status": "affected",
"version": "15.3(3)JPK6"
},
{
"status": "affected",
"version": "15.3(3)JPK7"
},
{
"status": "affected",
"version": "15.3(3)JPK8"
},
{
"status": "affected",
"version": "15.3(3)JPK9"
},
{
"status": "affected",
"version": "15.3(3)JPL"
},
{
"status": "affected",
"version": "15.3(3)JPM"
},
{
"status": "affected",
"version": "15.3(3)JPN"
},
{
"status": "affected",
"version": "15.3(3)JPN1"
},
{
"status": "affected",
"version": "15.3(3)JPN2"
},
{
"status": "affected",
"version": "15.3(3)JPN3"
},
{
"status": "affected",
"version": "15.3(3)JPN4"
},
{
"status": "affected",
"version": "15.3(3)JPN5"
},
{
"status": "affected",
"version": "15.3(3)JPN6"
},
{
"status": "affected",
"version": "15.3(3)JPO"
},
{
"status": "affected",
"version": "15.3(3)JPP"
},
{
"status": "affected",
"version": "15.3(3)JPQ"
},
{
"status": "affected",
"version": "15.3(3)JPQ1"
},
{
"status": "affected",
"version": "15.3(3)JPQ2"
},
{
"status": "affected",
"version": "15.3(3)JPQ3"
},
{
"status": "affected",
"version": "15.3(3)JPQ4"
},
{
"status": "affected",
"version": "15.3(3)JPQ5"
},
{
"status": "affected",
"version": "15.3(3)JPR"
},
{
"status": "affected",
"version": "15.3(3)JPS"
},
{
"status": "affected",
"version": "15.3(3)JPT"
},
{
"status": "affected",
"version": "15.3(3)JPT1"
},
{
"status": "affected",
"version": "15.3(3)JPT2"
}
]
},
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.2aS"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.3aS"
},
{
"status": "affected",
"version": "3.16.4S"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.16.6S"
},
{
"status": "affected",
"version": "3.16.7S"
},
{
"status": "affected",
"version": "3.16.6bS"
},
{
"status": "affected",
"version": "3.16.7aS"
},
{
"status": "affected",
"version": "3.16.7bS"
},
{
"status": "affected",
"version": "3.16.8S"
},
{
"status": "affected",
"version": "3.16.9S"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "3.17.4S"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.8.8E"
},
{
"status": "affected",
"version": "3.8.9E"
},
{
"status": "affected",
"version": "3.8.10E"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.2S"
},
{
"status": "affected",
"version": "3.18.3S"
},
{
"status": "affected",
"version": "3.18.4S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.1bSP"
},
{
"status": "affected",
"version": "3.18.1cSP"
},
{
"status": "affected",
"version": "3.18.2SP"
},
{
"status": "affected",
"version": "3.18.2aSP"
},
{
"status": "affected",
"version": "3.18.3SP"
},
{
"status": "affected",
"version": "3.18.4SP"
},
{
"status": "affected",
"version": "3.18.3aSP"
},
{
"status": "affected",
"version": "3.18.3bSP"
},
{
"status": "affected",
"version": "3.18.5SP"
},
{
"status": "affected",
"version": "3.18.6SP"
},
{
"status": "affected",
"version": "3.18.7SP"
},
{
"status": "affected",
"version": "3.18.8aSP"
},
{
"status": "affected",
"version": "3.18.9SP"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.2E"
},
{
"status": "affected",
"version": "3.10.3E"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "16.12.13"
},
{
"status": "affected",
"version": "3.11.0E"
},
{
"status": "affected",
"version": "3.11.1E"
},
{
"status": "affected",
"version": "3.11.2E"
},
{
"status": "affected",
"version": "3.11.3E"
},
{
"status": "affected",
"version": "3.11.1aE"
},
{
"status": "affected",
"version": "3.11.4E"
},
{
"status": "affected",
"version": "3.11.3aE"
},
{
"status": "affected",
"version": "3.11.5E"
},
{
"status": "affected",
"version": "3.11.6E"
},
{
"status": "affected",
"version": "3.11.7E"
},
{
"status": "affected",
"version": "3.11.8E"
},
{
"status": "affected",
"version": "3.11.9E"
},
{
"status": "affected",
"version": "3.11.10E"
},
{
"status": "affected",
"version": "3.11.11E"
},
{
"status": "affected",
"version": "3.11.12E"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.7"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.9.7a"
},
{
"status": "affected",
"version": "17.9.7b"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.5"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.12.1z3"
},
{
"status": "affected",
"version": "17.12.5a"
},
{
"status": "affected",
"version": "17.12.1z4"
},
{
"status": "affected",
"version": "17.12.5b"
},
{
"status": "affected",
"version": "17.12.5c"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.15.1z"
},
{
"status": "affected",
"version": "17.15.3"
},
{
"status": "affected",
"version": "17.15.2c"
},
{
"status": "affected",
"version": "17.15.2a"
},
{
"status": "affected",
"version": "17.15.1y"
},
{
"status": "affected",
"version": "17.15.2b"
},
{
"status": "affected",
"version": "17.15.3a"
},
{
"status": "affected",
"version": "17.15.4"
},
{
"status": "affected",
"version": "17.15.3b"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
},
{
"status": "affected",
"version": "17.17.1"
},
{
"status": "affected",
"version": "17.18.1"
}
]
},
{
"product": "Cisco IOS XE Catalyst SD-WAN",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "16.10.3a"
},
{
"status": "affected",
"version": "16.10.3b"
},
{
"status": "affected",
"version": "16.10.4"
},
{
"status": "affected",
"version": "16.10.5"
},
{
"status": "affected",
"version": "16.10.6"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.12.1b"
},
{
"status": "affected",
"version": "16.12.1d"
},
{
"status": "affected",
"version": "16.12.1e"
},
{
"status": "affected",
"version": "16.12.2r"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) became aware of successful exploitation of this vulnerability in the wild after local Administrator credentials were compromised. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-30T16:18:05.082Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-snmp-x4LPhte",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"
}
],
"source": {
"advisory": "cisco-sa-snmp-x4LPhte",
"defects": [
"CSCwq31287"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20352",
"datePublished": "2025-09-24T17:10:42.891Z",
"dateReserved": "2024-10-10T19:15:13.257Z",
"dateUpdated": "2025-10-21T22:45:17.376Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20195 (GCVE-0-2025-20195)
Vulnerability from nvd ā Published: 2025-05-07 17:49 ā Updated: 2025-05-07 19:39
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a CSRF attack and execute commands on the CLI of an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to clear the syslog, parser, and licensing logs on the affected device if the targeted user has privileges to clear those logs.
Severity ?
4.3 (Medium)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
16.1.1
Affected: 16.1.2 Affected: 16.1.3 Affected: 16.2.1 Affected: 16.2.2 Affected: 16.3.1 Affected: 16.3.2 Affected: 16.3.3 Affected: 16.3.1a Affected: 16.3.4 Affected: 16.3.5 Affected: 16.3.5b Affected: 16.3.6 Affected: 16.3.7 Affected: 16.3.8 Affected: 16.3.9 Affected: 16.3.10 Affected: 16.3.11 Affected: 16.4.1 Affected: 16.4.2 Affected: 16.4.3 Affected: 16.5.1 Affected: 16.5.1a Affected: 16.5.1b Affected: 16.5.2 Affected: 16.5.3 Affected: 16.6.1 Affected: 16.6.2 Affected: 16.6.3 Affected: 16.6.4 Affected: 16.6.5 Affected: 16.6.4a Affected: 16.6.5a Affected: 16.6.6 Affected: 16.6.7 Affected: 16.6.8 Affected: 16.6.9 Affected: 16.6.10 Affected: 16.7.1 Affected: 16.7.1a Affected: 16.7.1b Affected: 16.7.2 Affected: 16.7.3 Affected: 16.7.4 Affected: 16.8.1 Affected: 16.8.1a Affected: 16.8.1b Affected: 16.8.1s Affected: 16.8.1c Affected: 16.8.1d Affected: 16.8.2 Affected: 16.8.1e Affected: 16.8.3 Affected: 16.9.1 Affected: 16.9.2 Affected: 16.9.1a Affected: 16.9.1b Affected: 16.9.1s Affected: 16.9.3 Affected: 16.9.4 Affected: 16.9.3a Affected: 16.9.5 Affected: 16.9.5f Affected: 16.9.6 Affected: 16.9.7 Affected: 16.9.8 Affected: 16.10.1 Affected: 16.10.1a Affected: 16.10.1b Affected: 16.10.1s Affected: 16.10.1c Affected: 16.10.1e Affected: 16.10.1d Affected: 16.10.2 Affected: 16.10.1f Affected: 16.10.1g Affected: 16.10.3 Affected: 16.11.1 Affected: 16.11.1a Affected: 16.11.1b Affected: 16.11.2 Affected: 16.11.1s Affected: 16.12.1 Affected: 16.12.1s Affected: 16.12.1a Affected: 16.12.1c Affected: 16.12.1w Affected: 16.12.2 Affected: 16.12.1y Affected: 16.12.2a Affected: 16.12.3 Affected: 16.12.8 Affected: 16.12.2s Affected: 16.12.1x Affected: 16.12.1t Affected: 16.12.4 Affected: 16.12.3s Affected: 16.12.3a Affected: 16.12.4a Affected: 16.12.5 Affected: 16.12.6 Affected: 16.12.1z1 Affected: 16.12.5a Affected: 16.12.5b Affected: 16.12.1z2 Affected: 16.12.6a Affected: 16.12.7 Affected: 16.12.9 Affected: 16.12.10 Affected: 16.12.10a Affected: 16.12.11 Affected: 16.12.12 Affected: 17.1.1 Affected: 17.1.1a Affected: 17.1.1s Affected: 17.1.1t Affected: 17.1.3 Affected: 17.2.1 Affected: 17.2.1r Affected: 17.2.1a Affected: 17.2.1v Affected: 17.2.2 Affected: 17.2.3 Affected: 17.3.1 Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.5e Affected: 17.9.5f Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.11.99SW |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20195",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-07T18:55:34.763373Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T19:39:38.235Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "16.1.1"
},
{
"status": "affected",
"version": "16.1.2"
},
{
"status": "affected",
"version": "16.1.3"
},
{
"status": "affected",
"version": "16.2.1"
},
{
"status": "affected",
"version": "16.2.2"
},
{
"status": "affected",
"version": "16.3.1"
},
{
"status": "affected",
"version": "16.3.2"
},
{
"status": "affected",
"version": "16.3.3"
},
{
"status": "affected",
"version": "16.3.1a"
},
{
"status": "affected",
"version": "16.3.4"
},
{
"status": "affected",
"version": "16.3.5"
},
{
"status": "affected",
"version": "16.3.5b"
},
{
"status": "affected",
"version": "16.3.6"
},
{
"status": "affected",
"version": "16.3.7"
},
{
"status": "affected",
"version": "16.3.8"
},
{
"status": "affected",
"version": "16.3.9"
},
{
"status": "affected",
"version": "16.3.10"
},
{
"status": "affected",
"version": "16.3.11"
},
{
"status": "affected",
"version": "16.4.1"
},
{
"status": "affected",
"version": "16.4.2"
},
{
"status": "affected",
"version": "16.4.3"
},
{
"status": "affected",
"version": "16.5.1"
},
{
"status": "affected",
"version": "16.5.1a"
},
{
"status": "affected",
"version": "16.5.1b"
},
{
"status": "affected",
"version": "16.5.2"
},
{
"status": "affected",
"version": "16.5.3"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.11.99SW"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a CSRF attack and execute commands on the CLI of an affected device.\r\n\r\n This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to clear the syslog, parser, and licensing logs on the affected device if the targeted user has privileges to clear those logs."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T17:49:05.346Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-webui-multi-ARNHM4v6",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"source": {
"advisory": "cisco-sa-webui-multi-ARNHM4v6",
"defects": [
"CSCwk23580"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20195",
"datePublished": "2025-05-07T17:49:05.346Z",
"dateReserved": "2024-10-10T19:15:13.227Z",
"dateUpdated": "2025-05-07T19:39:38.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20194 (GCVE-0-2025-20194)
Vulnerability from nvd ā Published: 2025-05-07 17:48 ā Updated: 2025-05-08 03:56
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read limited files from the underlying operating system or clear the syslog and licensing logs on the affected device.
Severity ?
5.4 (Medium)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
17.3.1
Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.6.8 Affected: 17.6.8a Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.6 Affected: 17.9.6a Affected: 17.9.5e Affected: 17.9.5f Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.4 Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.12.4a Affected: 17.12.4b Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.11.99SW Affected: 17.15.1 Affected: 17.15.1w Affected: 17.15.1a Affected: 17.15.1b |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20194",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-07T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-08T03:56:37.461Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.11.99SW"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.1b"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.\r\n\r\n This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read limited files from the underlying operating system or clear the syslog and licensing logs on the affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T17:48:13.644Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-webui-multi-ARNHM4v6",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6"
}
],
"source": {
"advisory": "cisco-sa-webui-multi-ARNHM4v6",
"defects": [
"CSCwk25133"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20194",
"datePublished": "2025-05-07T17:48:13.644Z",
"dateReserved": "2024-10-10T19:15:13.227Z",
"dateUpdated": "2025-05-08T03:56:37.461Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}