Search criteria

78 vulnerabilities found for ios_xe_sd-wan by cisco

FKIE_CVE-2025-20352

Vulnerability from fkie_nvd - Published: 2025-09-24 18:15 - Updated: 2025-10-28 13:58
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. Note: This vulnerability affects all versions of SNMP.
Impacted products
Vendor Product Version
cisco ios_xe_sd-wan 16.9.1
cisco ios_xe_sd-wan 16.9.2
cisco ios_xe_sd-wan 16.9.3
cisco ios_xe_sd-wan 16.9.4
cisco ios_xe_sd-wan 16.10.1
cisco ios_xe_sd-wan 16.10.2
cisco ios_xe_sd-wan 16.10.3
cisco ios_xe_sd-wan 16.10.3a
cisco ios_xe_sd-wan 16.10.3b
cisco ios_xe_sd-wan 16.10.4
cisco ios_xe_sd-wan 16.10.5
cisco ios_xe_sd-wan 16.10.6
cisco ios_xe_sd-wan 16.11.1a
cisco ios_xe_sd-wan 16.12.1b
cisco ios_xe_sd-wan 16.12.1d
cisco ios_xe_sd-wan 16.12.1e
cisco ios_xe_sd-wan 16.12.2r
cisco ios_xe_sd-wan 16.12.3
cisco ios_xe_sd-wan 16.12.4
cisco ios_xe_sd-wan 16.12.4a
cisco ios_xe_sd-wan 16.12.5
cisco ios_xe 3.5.0e
cisco ios_xe 3.5.0sq
cisco ios_xe 3.5.1e
cisco ios_xe 3.5.1sq
cisco ios_xe 3.5.2e
cisco ios_xe 3.5.2sq
cisco ios_xe 3.5.3e
cisco ios_xe 3.5.3sq
cisco ios_xe 3.5.4sq
cisco ios_xe 3.5.5sq
cisco ios_xe 3.5.6sq
cisco ios_xe 3.5.7sq
cisco ios_xe 3.5.8sq
cisco ios_xe 3.6.0e
cisco ios_xe 3.6.1e
cisco ios_xe 3.6.2ae
cisco ios_xe 3.6.2e
cisco ios_xe 3.6.3e
cisco ios_xe 3.6.4e
cisco ios_xe 3.6.5ae
cisco ios_xe 3.6.5e
cisco ios_xe 3.6.6e
cisco ios_xe 3.6.7be
cisco ios_xe 3.6.7e
cisco ios_xe 3.6.8e
cisco ios_xe 3.6.9e
cisco ios_xe 3.6.10e
cisco ios_xe 3.7.0e
cisco ios_xe 3.7.1e
cisco ios_xe 3.7.2e
cisco ios_xe 3.7.3e
cisco ios_xe 3.7.4e
cisco ios_xe 3.7.5e
cisco ios_xe 3.8.0e
cisco ios_xe 3.8.1e
cisco ios_xe 3.8.2e
cisco ios_xe 3.8.3e
cisco ios_xe 3.8.4e
cisco ios_xe 3.8.5ae
cisco ios_xe 3.8.5e
cisco ios_xe 3.8.6e
cisco ios_xe 3.8.7e
cisco ios_xe 3.8.8e
cisco ios_xe 3.8.9e
cisco ios_xe 3.8.10e
cisco ios_xe 3.9.0e
cisco ios_xe 3.9.1e
cisco ios_xe 3.9.2e
cisco ios_xe 3.10.0ce
cisco ios_xe 3.10.0e
cisco ios_xe 3.10.1e
cisco ios_xe 3.10.2e
cisco ios_xe 3.10.3e
cisco ios_xe 3.11.0e
cisco ios_xe 3.11.1ae
cisco ios_xe 3.11.1e
cisco ios_xe 3.11.2e
cisco ios_xe 3.11.3ae
cisco ios_xe 3.11.3e
cisco ios_xe 3.11.4e
cisco ios_xe 3.11.5e
cisco ios_xe 3.11.6e
cisco ios_xe 3.11.7e
cisco ios_xe 3.11.8e
cisco ios_xe 3.11.9e
cisco ios_xe 3.11.10e
cisco ios_xe 3.11.11e
cisco ios_xe 3.11.12e
cisco ios_xe 3.14.0s
cisco ios_xe 3.14.1s
cisco ios_xe 3.14.2s
cisco ios_xe 3.14.3s
cisco ios_xe 3.14.4s
cisco ios_xe 3.15.0s
cisco ios_xe 3.15.1cs
cisco ios_xe 3.15.1s
cisco ios_xe 3.15.2s
cisco ios_xe 3.15.3s
cisco ios_xe 3.15.4s
cisco ios_xe 3.16.0cs
cisco ios_xe 3.16.0s
cisco ios_xe 3.16.1as
cisco ios_xe 3.16.1s
cisco ios_xe 3.16.2as
cisco ios_xe 3.16.2bs
cisco ios_xe 3.16.2s
cisco ios_xe 3.16.3as
cisco ios_xe 3.16.3s
cisco ios_xe 3.16.4as
cisco ios_xe 3.16.4bs
cisco ios_xe 3.16.4ds
cisco ios_xe 3.16.4s
cisco ios_xe 3.16.5s
cisco ios_xe 3.16.6bs
cisco ios_xe 3.16.6s
cisco ios_xe 3.16.7as
cisco ios_xe 3.16.7bs
cisco ios_xe 3.16.7s
cisco ios_xe 3.16.8s
cisco ios_xe 3.16.9s
cisco ios_xe 3.16.10s
cisco ios_xe 3.17.0s
cisco ios_xe 3.17.1as
cisco ios_xe 3.17.1s
cisco ios_xe 3.17.2s
cisco ios_xe 3.17.3s
cisco ios_xe 3.17.4s
cisco ios_xe 3.18.0as
cisco ios_xe 3.18.0s
cisco ios_xe 3.18.0sp
cisco ios_xe 3.18.1asp
cisco ios_xe 3.18.1bsp
cisco ios_xe 3.18.1csp
cisco ios_xe 3.18.1s
cisco ios_xe 3.18.1sp
cisco ios_xe 3.18.2asp
cisco ios_xe 3.18.2s
cisco ios_xe 3.18.2sp
cisco ios_xe 3.18.3asp
cisco ios_xe 3.18.3bsp
cisco ios_xe 3.18.3s
cisco ios_xe 3.18.3sp
cisco ios_xe 3.18.4s
cisco ios_xe 3.18.4sp
cisco ios_xe 3.18.5sp
cisco ios_xe 3.18.6sp
cisco ios_xe 3.18.7sp
cisco ios_xe 3.18.8asp
cisco ios_xe 3.18.9sp
cisco ios_xe 16.6.1
cisco ios_xe 16.6.2
cisco ios_xe 16.6.3
cisco ios_xe 16.6.4
cisco ios_xe 16.6.4a
cisco ios_xe 16.6.5
cisco ios_xe 16.6.5a
cisco ios_xe 16.6.6
cisco ios_xe 16.6.7
cisco ios_xe 16.6.8
cisco ios_xe 16.6.9
cisco ios_xe 16.6.10
cisco ios_xe 16.7.1
cisco ios_xe 16.7.1a
cisco ios_xe 16.7.1b
cisco ios_xe 16.7.2
cisco ios_xe 16.7.3
cisco ios_xe 16.7.4
cisco ios_xe 16.8.1
cisco ios_xe 16.8.1a
cisco ios_xe 16.8.1b
cisco ios_xe 16.8.1c
cisco ios_xe 16.8.1d
cisco ios_xe 16.8.1e
cisco ios_xe 16.8.1s
cisco ios_xe 16.8.2
cisco ios_xe 16.8.3
cisco ios_xe 16.9.1
cisco ios_xe 16.9.1a
cisco ios_xe 16.9.1b
cisco ios_xe 16.9.1s
cisco ios_xe 16.9.2
cisco ios_xe 16.9.3
cisco ios_xe 16.9.3a
cisco ios_xe 16.9.4
cisco ios_xe 16.9.5
cisco ios_xe 16.9.5f
cisco ios_xe 16.9.6
cisco ios_xe 16.9.7
cisco ios_xe 16.9.8
cisco ios_xe 16.10.1
cisco ios_xe 16.10.1a
cisco ios_xe 16.10.1b
cisco ios_xe 16.10.1c
cisco ios_xe 16.10.1d
cisco ios_xe 16.10.1e
cisco ios_xe 16.10.1f
cisco ios_xe 16.10.1g
cisco ios_xe 16.10.1s
cisco ios_xe 16.10.2
cisco ios_xe 16.10.3
cisco ios_xe 16.11.1
cisco ios_xe 16.11.1a
cisco ios_xe 16.11.1b
cisco ios_xe 16.11.1s
cisco ios_xe 16.11.2
cisco ios_xe 16.12.1
cisco ios_xe 16.12.1a
cisco ios_xe 16.12.1c
cisco ios_xe 16.12.1s
cisco ios_xe 16.12.1t
cisco ios_xe 16.12.1w
cisco ios_xe 16.12.1x
cisco ios_xe 16.12.1y
cisco ios_xe 16.12.1z1
cisco ios_xe 16.12.1z2
cisco ios_xe 16.12.2
cisco ios_xe 16.12.2a
cisco ios_xe 16.12.2s
cisco ios_xe 16.12.3
cisco ios_xe 16.12.3a
cisco ios_xe 16.12.3s
cisco ios_xe 16.12.4
cisco ios_xe 16.12.4a
cisco ios_xe 16.12.5
cisco ios_xe 16.12.5a
cisco ios_xe 16.12.5b
cisco ios_xe 16.12.6
cisco ios_xe 16.12.6a
cisco ios_xe 16.12.7
cisco ios_xe 16.12.8
cisco ios_xe 16.12.9
cisco ios_xe 16.12.10
cisco ios_xe 16.12.10a
cisco ios_xe 16.12.11
cisco ios_xe 16.12.12
cisco ios_xe 16.12.13
cisco ios_xe 17.1.1
cisco ios_xe 17.1.1a
cisco ios_xe 17.1.1s
cisco ios_xe 17.1.1t
cisco ios_xe 17.1.3
cisco ios_xe 17.2.1
cisco ios_xe 17.2.1a
cisco ios_xe 17.2.1r
cisco ios_xe 17.2.1v
cisco ios_xe 17.2.2
cisco ios_xe 17.2.3
cisco ios_xe 17.3.1
cisco ios_xe 17.3.1a
cisco ios_xe 17.3.1w
cisco ios_xe 17.3.1x
cisco ios_xe 17.3.1z
cisco ios_xe 17.3.2
cisco ios_xe 17.3.2a
cisco ios_xe 17.3.3
cisco ios_xe 17.3.4
cisco ios_xe 17.3.4a
cisco ios_xe 17.3.4b
cisco ios_xe 17.3.4c
cisco ios_xe 17.3.5
cisco ios_xe 17.3.5a
cisco ios_xe 17.3.5b
cisco ios_xe 17.3.6
cisco ios_xe 17.3.7
cisco ios_xe 17.3.8
cisco ios_xe 17.3.8a
cisco ios_xe 17.4.1
cisco ios_xe 17.4.1a
cisco ios_xe 17.4.1b
cisco ios_xe 17.4.2
cisco ios_xe 17.4.2a
cisco ios_xe 17.5.1
cisco ios_xe 17.5.1a
cisco ios_xe 17.6.1
cisco ios_xe 17.6.1a
cisco ios_xe 17.6.1w
cisco ios_xe 17.6.1x
cisco ios_xe 17.6.1y
cisco ios_xe 17.6.1z
cisco ios_xe 17.6.1z1
cisco ios_xe 17.6.2
cisco ios_xe 17.6.3
cisco ios_xe 17.6.3a
cisco ios_xe 17.6.4
cisco ios_xe 17.6.5
cisco ios_xe 17.6.5a
cisco ios_xe 17.6.6
cisco ios_xe 17.6.6a
cisco ios_xe 17.6.7
cisco ios_xe 17.6.8
cisco ios_xe 17.6.8a
cisco ios_xe 17.7.1
cisco ios_xe 17.7.1a
cisco ios_xe 17.7.1b
cisco ios_xe 17.7.2
cisco ios_xe 17.8.1
cisco ios_xe 17.8.1a
cisco ios_xe 17.9.1
cisco ios_xe 17.9.1a
cisco ios_xe 17.9.1w
cisco ios_xe 17.9.1x
cisco ios_xe 17.9.1x1
cisco ios_xe 17.9.1y
cisco ios_xe 17.9.1y1
cisco ios_xe 17.9.2
cisco ios_xe 17.9.2a
cisco ios_xe 17.9.3
cisco ios_xe 17.9.3a
cisco ios_xe 17.9.4
cisco ios_xe 17.9.4a
cisco ios_xe 17.9.5
cisco ios_xe 17.9.5a
cisco ios_xe 17.9.5b
cisco ios_xe 17.9.5e
cisco ios_xe 17.9.5f
cisco ios_xe 17.9.6
cisco ios_xe 17.9.6a
cisco ios_xe 17.9.7
cisco ios_xe 17.9.7a
cisco ios_xe 17.9.7b
cisco ios_xe 17.10.1
cisco ios_xe 17.10.1a
cisco ios_xe 17.10.1b
cisco ios_xe 17.11.1
cisco ios_xe 17.11.1a
cisco ios_xe 17.12.1
cisco ios_xe 17.12.1a
cisco ios_xe 17.12.1w
cisco ios_xe 17.12.1x
cisco ios_xe 17.12.1y
cisco ios_xe 17.12.1z
cisco ios_xe 17.12.1z1
cisco ios_xe 17.12.1z2
cisco ios_xe 17.12.1z3
cisco ios_xe 17.12.1z4
cisco ios_xe 17.12.2
cisco ios_xe 17.12.2a
cisco ios_xe 17.12.3
cisco ios_xe 17.12.3a
cisco ios_xe 17.12.4
cisco ios_xe 17.12.4a
cisco ios_xe 17.12.4b
cisco ios_xe 17.12.5
cisco ios_xe 17.12.5a
cisco ios_xe 17.12.5b
cisco ios_xe 17.12.5c
cisco ios_xe 17.13.1
cisco ios_xe 17.13.1a
cisco ios_xe 17.14.1
cisco ios_xe 17.14.1a
cisco ios_xe 17.15.1
cisco ios_xe 17.15.1a
cisco ios_xe 17.15.1b
cisco ios_xe 17.15.1w
cisco ios_xe 17.15.1x
cisco ios_xe 17.15.1y
cisco ios_xe 17.15.1z
cisco ios_xe 17.15.2
cisco ios_xe 17.15.2a
cisco ios_xe 17.15.2b
cisco ios_xe 17.15.2c
cisco ios_xe 17.15.3
cisco ios_xe 17.15.3a
cisco ios_xe 17.15.3b
cisco ios_xe 17.15.4
cisco ios_xe 17.16.1
cisco ios_xe 17.16.1a
cisco ios_xe 17.17.1
cisco ios_xe 17.18.1
cisco ios 12.2\(33\)sxi
cisco ios 12.2\(33\)sxi1
cisco ios 12.2\(33\)sxi2
cisco ios 12.2\(33\)sxi2a
cisco ios 12.2\(33\)sxi3
cisco ios 12.2\(33\)sxi4
cisco ios 12.2\(33\)sxi4a
cisco ios 12.2\(33\)sxi5
cisco ios 12.2\(33\)sxi6
cisco ios 12.2\(33\)sxi7
cisco ios 12.2\(33\)sxi8
cisco ios 12.2\(33\)sxi8a
cisco ios 12.2\(33\)sxi9
cisco ios 12.2\(33\)sxi10
cisco ios 12.2\(33\)sxi11
cisco ios 12.2\(33\)sxi12
cisco ios 12.2\(33\)sxi13
cisco ios 12.2\(33\)sxi14
cisco ios 12.2\(33\)sxj
cisco ios 12.2\(33\)sxj1
cisco ios 12.2\(33\)sxj2
cisco ios 12.2\(33\)sxj3
cisco ios 12.2\(33\)sxj4
cisco ios 12.2\(33\)sxj5
cisco ios 12.2\(33\)sxj6
cisco ios 12.2\(33\)sxj7
cisco ios 12.2\(33\)sxj8
cisco ios 12.2\(33\)sxj9
cisco ios 12.2\(33\)sxj10
cisco ios 12.2\(50\)sq
cisco ios 12.2\(50\)sq1
cisco ios 12.2\(50\)sq2
cisco ios 12.2\(50\)sq3
cisco ios 12.2\(50\)sq4
cisco ios 12.2\(50\)sq5
cisco ios 12.2\(50\)sq6
cisco ios 12.2\(50\)sq7
cisco ios 12.2\(53\)ez
cisco ios 12.2\(55\)ez
cisco ios 12.2\(55\)se
cisco ios 12.2\(55\)se1
cisco ios 12.2\(55\)se2
cisco ios 12.2\(55\)se3
cisco ios 12.2\(55\)se4
cisco ios 12.2\(55\)se5
cisco ios 12.2\(55\)se6
cisco ios 12.2\(55\)se7
cisco ios 12.2\(55\)se8
cisco ios 12.2\(55\)se9
cisco ios 12.2\(55\)se10
cisco ios 12.2\(55\)se11
cisco ios 12.2\(55\)se12
cisco ios 12.2\(55\)se13
cisco ios 12.2\(58\)ez
cisco ios 12.2\(58\)se
cisco ios 12.2\(58\)se1
cisco ios 12.2\(58\)se2
cisco ios 12.2\(60\)ez
cisco ios 12.2\(60\)ez1
cisco ios 12.2\(60\)ez2
cisco ios 12.2\(60\)ez3
cisco ios 12.2\(60\)ez4
cisco ios 12.2\(60\)ez5
cisco ios 12.2\(60\)ez6
cisco ios 12.2\(60\)ez7
cisco ios 12.2\(60\)ez8
cisco ios 12.2\(60\)ez9
cisco ios 12.2\(60\)ez10
cisco ios 12.2\(60\)ez11
cisco ios 12.2\(60\)ez12
cisco ios 12.2\(60\)ez13
cisco ios 12.2\(60\)ez14
cisco ios 12.2\(60\)ez15
cisco ios 15.0\(1\)ey
cisco ios 15.0\(1\)ey1
cisco ios 15.0\(1\)ey2
cisco ios 15.0\(1\)se
cisco ios 15.0\(1\)se1
cisco ios 15.0\(1\)se2
cisco ios 15.0\(1\)se3
cisco ios 15.0\(1\)sy
cisco ios 15.0\(1\)sy1
cisco ios 15.0\(1\)sy2
cisco ios 15.0\(1\)sy3
cisco ios 15.0\(1\)sy4
cisco ios 15.0\(1\)sy5
cisco ios 15.0\(1\)sy6
cisco ios 15.0\(1\)sy7
cisco ios 15.0\(1\)sy7a
cisco ios 15.0\(1\)sy8
cisco ios 15.0\(1\)sy9
cisco ios 15.0\(1\)sy10
cisco ios 15.0\(2\)ea
cisco ios 15.0\(2\)ea1
cisco ios 15.0\(2\)ej
cisco ios 15.0\(2\)ej1
cisco ios 15.0\(2\)ek
cisco ios 15.0\(2\)ek1
cisco ios 15.0\(2\)ey
cisco ios 15.0\(2\)ey1
cisco ios 15.0\(2\)ey2
cisco ios 15.0\(2\)ey3
cisco ios 15.0\(2\)se
cisco ios 15.0\(2\)se1
cisco ios 15.0\(2\)se2
cisco ios 15.0\(2\)se3
cisco ios 15.0\(2\)se4
cisco ios 15.0\(2\)se5
cisco ios 15.0\(2\)se6
cisco ios 15.0\(2\)se7
cisco ios 15.0\(2\)se8
cisco ios 15.0\(2\)se9
cisco ios 15.0\(2\)se10
cisco ios 15.0\(2\)se10a
cisco ios 15.0\(2\)se11
cisco ios 15.0\(2\)se12
cisco ios 15.0\(2\)se13
cisco ios 15.0\(2\)sg
cisco ios 15.0\(2\)sg1
cisco ios 15.0\(2\)sg2
cisco ios 15.0\(2\)sg3
cisco ios 15.0\(2\)sg4
cisco ios 15.0\(2\)sg5
cisco ios 15.0\(2\)sg6
cisco ios 15.0\(2\)sg7
cisco ios 15.0\(2\)sg8
cisco ios 15.0\(2\)sg9
cisco ios 15.0\(2\)sg10
cisco ios 15.0\(2\)sg11
cisco ios 15.0\(2\)sqd
cisco ios 15.0\(2\)sqd1
cisco ios 15.0\(2\)sqd2
cisco ios 15.0\(2\)sqd3
cisco ios 15.0\(2\)sqd4
cisco ios 15.0\(2\)sqd5
cisco ios 15.0\(2\)sqd6
cisco ios 15.0\(2\)sqd7
cisco ios 15.0\(2\)sqd8
cisco ios 15.1\(1\)sg
cisco ios 15.1\(1\)sg1
cisco ios 15.1\(1\)sg2
cisco ios 15.1\(1\)sy
cisco ios 15.1\(1\)sy1
cisco ios 15.1\(1\)sy2
cisco ios 15.1\(1\)sy3
cisco ios 15.1\(1\)sy4
cisco ios 15.1\(1\)sy5
cisco ios 15.1\(1\)sy6
cisco ios 15.1\(2\)sg
cisco ios 15.1\(2\)sg1
cisco ios 15.1\(2\)sg2
cisco ios 15.1\(2\)sg3
cisco ios 15.1\(2\)sg4
cisco ios 15.1\(2\)sg5
cisco ios 15.1\(2\)sg6
cisco ios 15.1\(2\)sg7
cisco ios 15.1\(2\)sg8
cisco ios 15.1\(2\)sy
cisco ios 15.1\(2\)sy1
cisco ios 15.1\(2\)sy2
cisco ios 15.1\(2\)sy3
cisco ios 15.1\(2\)sy4
cisco ios 15.1\(2\)sy4a
cisco ios 15.1\(2\)sy5
cisco ios 15.1\(2\)sy6
cisco ios 15.1\(2\)sy7
cisco ios 15.1\(2\)sy8
cisco ios 15.1\(2\)sy9
cisco ios 15.1\(2\)sy10
cisco ios 15.1\(2\)sy11
cisco ios 15.1\(2\)sy12
cisco ios 15.1\(2\)sy13
cisco ios 15.1\(2\)sy14
cisco ios 15.1\(2\)sy15
cisco ios 15.1\(2\)sy16
cisco ios 15.2\(1\)e
cisco ios 15.2\(1\)e1
cisco ios 15.2\(1\)e2
cisco ios 15.2\(1\)e3
cisco ios 15.2\(1\)ey
cisco ios 15.2\(1\)sy
cisco ios 15.2\(1\)sy0a
cisco ios 15.2\(1\)sy1
cisco ios 15.2\(1\)sy1a
cisco ios 15.2\(1\)sy2
cisco ios 15.2\(1\)sy3
cisco ios 15.2\(1\)sy4
cisco ios 15.2\(1\)sy5
cisco ios 15.2\(1\)sy6
cisco ios 15.2\(1\)sy7
cisco ios 15.2\(1\)sy8
cisco ios 15.2\(2\)e
cisco ios 15.2\(2\)e1
cisco ios 15.2\(2\)e2
cisco ios 15.2\(2\)e3
cisco ios 15.2\(2\)e4
cisco ios 15.2\(2\)e5
cisco ios 15.2\(2\)e5a
cisco ios 15.2\(2\)e5b
cisco ios 15.2\(2\)e6
cisco ios 15.2\(2\)e7
cisco ios 15.2\(2\)e8
cisco ios 15.2\(2\)e9
cisco ios 15.2\(2\)e10
cisco ios 15.2\(2\)ea
cisco ios 15.2\(2\)ea1
cisco ios 15.2\(2\)ea2
cisco ios 15.2\(2\)ea3
cisco ios 15.2\(2\)gc
cisco ios 15.2\(2\)jax
cisco ios 15.2\(2\)jb
cisco ios 15.2\(2\)jb2
cisco ios 15.2\(2\)jb3
cisco ios 15.2\(2\)jb4
cisco ios 15.2\(2\)jb5
cisco ios 15.2\(2\)jb6
cisco ios 15.2\(2\)sy
cisco ios 15.2\(2\)sy1
cisco ios 15.2\(2\)sy2
cisco ios 15.2\(2\)sy3
cisco ios 15.2\(2a\)e1
cisco ios 15.2\(2a\)e2
cisco ios 15.2\(3\)e
cisco ios 15.2\(3\)e1
cisco ios 15.2\(3\)e2
cisco ios 15.2\(3\)e3
cisco ios 15.2\(3\)e4
cisco ios 15.2\(3\)ea
cisco ios 15.2\(3\)gc
cisco ios 15.2\(3\)gc1
cisco ios 15.2\(3a\)e
cisco ios 15.2\(4\)e
cisco ios 15.2\(4\)e1
cisco ios 15.2\(4\)e2
cisco ios 15.2\(4\)e3
cisco ios 15.2\(4\)e4
cisco ios 15.2\(4\)e5
cisco ios 15.2\(4\)e6
cisco ios 15.2\(4\)e7
cisco ios 15.2\(4\)e8
cisco ios 15.2\(4\)e9
cisco ios 15.2\(4\)e10
cisco ios 15.2\(4\)e10a
cisco ios 15.2\(4\)e10d
cisco ios 15.2\(4\)ea
cisco ios 15.2\(4\)ea1
cisco ios 15.2\(4\)ea3
cisco ios 15.2\(4\)ea4
cisco ios 15.2\(4\)ea5
cisco ios 15.2\(4\)ea6
cisco ios 15.2\(4\)ea7
cisco ios 15.2\(4\)ea8
cisco ios 15.2\(4\)ea9
cisco ios 15.2\(4\)ea9a
cisco ios 15.2\(4\)ec1
cisco ios 15.2\(4\)ec2
cisco ios 15.2\(4\)gc
cisco ios 15.2\(4\)gc1
cisco ios 15.2\(4\)gc2
cisco ios 15.2\(4\)gc3
cisco ios 15.2\(4\)jb
cisco ios 15.2\(4\)jb1
cisco ios 15.2\(4\)jb2
cisco ios 15.2\(4\)jb3
cisco ios 15.2\(4\)jb3a
cisco ios 15.2\(4\)jb3b
cisco ios 15.2\(4\)jb3h
cisco ios 15.2\(4\)jb4
cisco ios 15.2\(4\)jb5
cisco ios 15.2\(4\)jb6
cisco ios 15.2\(4\)jn
cisco ios 15.2\(4\)m
cisco ios 15.2\(4\)m1
cisco ios 15.2\(4\)m2
cisco ios 15.2\(4\)m3
cisco ios 15.2\(4\)m4
cisco ios 15.2\(4\)m5
cisco ios 15.2\(4\)m6
cisco ios 15.2\(4\)m6a
cisco ios 15.2\(4\)m7
cisco ios 15.2\(4\)m8
cisco ios 15.2\(4\)m9
cisco ios 15.2\(4\)m10
cisco ios 15.2\(4\)m11
cisco ios 15.2\(5\)e
cisco ios 15.2\(5\)e1
cisco ios 15.2\(5\)e2
cisco ios 15.2\(5\)e2c
cisco ios 15.2\(5\)ea
cisco ios 15.2\(5\)ex
cisco ios 15.2\(5a\)e
cisco ios 15.2\(5a\)e1
cisco ios 15.2\(5b\)e
cisco ios 15.2\(5c\)e
cisco ios 15.2\(6\)e
cisco ios 15.2\(6\)e0a
cisco ios 15.2\(6\)e0c
cisco ios 15.2\(6\)e1
cisco ios 15.2\(6\)e2
cisco ios 15.2\(6\)e2a
cisco ios 15.2\(6\)e2b
cisco ios 15.2\(6\)e3
cisco ios 15.2\(7\)e
cisco ios 15.2\(7\)e0a
cisco ios 15.2\(7\)e0b
cisco ios 15.2\(7\)e0s
cisco ios 15.2\(7\)e1
cisco ios 15.2\(7\)e1a
cisco ios 15.2\(7\)e2
cisco ios 15.2\(7\)e2a
cisco ios 15.2\(7\)e3
cisco ios 15.2\(7\)e3k
cisco ios 15.2\(7\)e4
cisco ios 15.2\(7\)e5
cisco ios 15.2\(7\)e6
cisco ios 15.2\(7\)e7
cisco ios 15.2\(7\)e8
cisco ios 15.2\(7\)e9
cisco ios 15.2\(7\)e10
cisco ios 15.2\(7\)e11
cisco ios 15.2\(7\)e12
cisco ios 15.2\(7a\)e0b
cisco ios 15.2\(7b\)e0b
cisco ios 15.2\(8\)e
cisco ios 15.2\(8\)e1
cisco ios 15.2\(8\)e2
cisco ios 15.2\(8\)e3
cisco ios 15.2\(8\)e4
cisco ios 15.2\(8\)e5
cisco ios 15.2\(8\)e6
cisco ios 15.2\(8\)e7
cisco ios 15.3\(1\)sy
cisco ios 15.3\(1\)sy1
cisco ios 15.3\(1\)sy2
cisco ios 15.3\(1\)t
cisco ios 15.3\(1\)t1
cisco ios 15.3\(1\)t2
cisco ios 15.3\(1\)t3
cisco ios 15.3\(1\)t4
cisco ios 15.3\(2\)t
cisco ios 15.3\(2\)t1
cisco ios 15.3\(2\)t2
cisco ios 15.3\(2\)t3
cisco ios 15.3\(2\)t4
cisco ios 15.3\(3\)ja1
cisco ios 15.3\(3\)ja1m
cisco ios 15.3\(3\)ja4
cisco ios 15.3\(3\)ja5
cisco ios 15.3\(3\)ja6
cisco ios 15.3\(3\)ja7
cisco ios 15.3\(3\)ja8
cisco ios 15.3\(3\)ja10
cisco ios 15.3\(3\)ja11
cisco ios 15.3\(3\)ja12
cisco ios 15.3\(3\)jaa
cisco ios 15.3\(3\)jaa11
cisco ios 15.3\(3\)jaa12
cisco ios 15.3\(3\)jab
cisco ios 15.3\(3\)jax
cisco ios 15.3\(3\)jax1
cisco ios 15.3\(3\)jax2
cisco ios 15.3\(3\)jb
cisco ios 15.3\(3\)jbb
cisco ios 15.3\(3\)jbb1
cisco ios 15.3\(3\)jbb2
cisco ios 15.3\(3\)jbb4
cisco ios 15.3\(3\)jbb5
cisco ios 15.3\(3\)jbb6
cisco ios 15.3\(3\)jbb6a
cisco ios 15.3\(3\)jbb8
cisco ios 15.3\(3\)jc
cisco ios 15.3\(3\)jc1
cisco ios 15.3\(3\)jc2
cisco ios 15.3\(3\)jc3
cisco ios 15.3\(3\)jc4
cisco ios 15.3\(3\)jc5
cisco ios 15.3\(3\)jc6
cisco ios 15.3\(3\)jc8
cisco ios 15.3\(3\)jc9
cisco ios 15.3\(3\)jc14
cisco ios 15.3\(3\)jca7
cisco ios 15.3\(3\)jca8
cisco ios 15.3\(3\)jca9
cisco ios 15.3\(3\)jd
cisco ios 15.3\(3\)jd2
cisco ios 15.3\(3\)jd3
cisco ios 15.3\(3\)jd4
cisco ios 15.3\(3\)jd5
cisco ios 15.3\(3\)jd6
cisco ios 15.3\(3\)jd7
cisco ios 15.3\(3\)jd8
cisco ios 15.3\(3\)jd9
cisco ios 15.3\(3\)jd11
cisco ios 15.3\(3\)jd13
cisco ios 15.3\(3\)jd14
cisco ios 15.3\(3\)jd16
cisco ios 15.3\(3\)jd17
cisco ios 15.3\(3\)jda7
cisco ios 15.3\(3\)jda8
cisco ios 15.3\(3\)jda9
cisco ios 15.3\(3\)jda11
cisco ios 15.3\(3\)jda13
cisco ios 15.3\(3\)jda14
cisco ios 15.3\(3\)jda16
cisco ios 15.3\(3\)jda17
cisco ios 15.3\(3\)je
cisco ios 15.3\(3\)jf
cisco ios 15.3\(3\)jf1
cisco ios 15.3\(3\)jf2
cisco ios 15.3\(3\)jf4
cisco ios 15.3\(3\)jf5
cisco ios 15.3\(3\)jf6
cisco ios 15.3\(3\)jf7
cisco ios 15.3\(3\)jf8
cisco ios 15.3\(3\)jf9
cisco ios 15.3\(3\)jf10
cisco ios 15.3\(3\)jf11
cisco ios 15.3\(3\)jf12
cisco ios 15.3\(3\)jf12i
cisco ios 15.3\(3\)jf14
cisco ios 15.3\(3\)jf14i
cisco ios 15.3\(3\)jf15
cisco ios 15.3\(3\)jg
cisco ios 15.3\(3\)jg1
cisco ios 15.3\(3\)jh
cisco ios 15.3\(3\)jh1
cisco ios 15.3\(3\)ji1
cisco ios 15.3\(3\)ji3
cisco ios 15.3\(3\)ji4
cisco ios 15.3\(3\)ji5
cisco ios 15.3\(3\)ji6
cisco ios 15.3\(3\)jj
cisco ios 15.3\(3\)jj1
cisco ios 15.3\(3\)jk
cisco ios 15.3\(3\)jk1
cisco ios 15.3\(3\)jk1t
cisco ios 15.3\(3\)jk2
cisco ios 15.3\(3\)jk2a
cisco ios 15.3\(3\)jk3
cisco ios 15.3\(3\)jk4
cisco ios 15.3\(3\)jk5
cisco ios 15.3\(3\)jk6
cisco ios 15.3\(3\)jk7
cisco ios 15.3\(3\)jk8
cisco ios 15.3\(3\)jk8a
cisco ios 15.3\(3\)jk8b
cisco ios 15.3\(3\)jk9
cisco ios 15.3\(3\)jk10
cisco ios 15.3\(3\)jk11
cisco ios 15.3\(3\)jn3
cisco ios 15.3\(3\)jn4
cisco ios 15.3\(3\)jn7
cisco ios 15.3\(3\)jn8
cisco ios 15.3\(3\)jn9
cisco ios 15.3\(3\)jnb
cisco ios 15.3\(3\)jnb1
cisco ios 15.3\(3\)jnb2
cisco ios 15.3\(3\)jnb3
cisco ios 15.3\(3\)jnb4
cisco ios 15.3\(3\)jnb5
cisco ios 15.3\(3\)jnb6
cisco ios 15.3\(3\)jnc
cisco ios 15.3\(3\)jnc1
cisco ios 15.3\(3\)jnc4
cisco ios 15.3\(3\)jnd
cisco ios 15.3\(3\)jnd1
cisco ios 15.3\(3\)jnd2
cisco ios 15.3\(3\)jnd3
cisco ios 15.3\(3\)jnp
cisco ios 15.3\(3\)jnp1
cisco ios 15.3\(3\)jnp3
cisco ios 15.3\(3\)jpb
cisco ios 15.3\(3\)jpb1
cisco ios 15.3\(3\)jpc
cisco ios 15.3\(3\)jpc1
cisco ios 15.3\(3\)jpc2
cisco ios 15.3\(3\)jpc3
cisco ios 15.3\(3\)jpc5
cisco ios 15.3\(3\)jpd
cisco ios 15.3\(3\)jpi1
cisco ios 15.3\(3\)jpi1t
cisco ios 15.3\(3\)jpi4
cisco ios 15.3\(3\)jpi5
cisco ios 15.3\(3\)jpi6a
cisco ios 15.3\(3\)jpi7
cisco ios 15.3\(3\)jpi8a
cisco ios 15.3\(3\)jpi9
cisco ios 15.3\(3\)jpi10
cisco ios 15.3\(3\)jpj2
cisco ios 15.3\(3\)jpj2t
cisco ios 15.3\(3\)jpj3
cisco ios 15.3\(3\)jpj3a
cisco ios 15.3\(3\)jpj4
cisco ios 15.3\(3\)jpj5
cisco ios 15.3\(3\)jpj6
cisco ios 15.3\(3\)jpj7
cisco ios 15.3\(3\)jpj7c
cisco ios 15.3\(3\)jpj8a
cisco ios 15.3\(3\)jpj9
cisco ios 15.3\(3\)jpj10
cisco ios 15.3\(3\)jpj11
cisco ios 15.3\(3\)jpk
cisco ios 15.3\(3\)jpk1
cisco ios 15.3\(3\)jpk2
cisco ios 15.3\(3\)jpk3
cisco ios 15.3\(3\)jpk4
cisco ios 15.3\(3\)jpk5
cisco ios 15.3\(3\)jpk6
cisco ios 15.3\(3\)jpk7
cisco ios 15.3\(3\)jpk8
cisco ios 15.3\(3\)jpk9
cisco ios 15.3\(3\)jpl
cisco ios 15.3\(3\)jpm
cisco ios 15.3\(3\)jpn
cisco ios 15.3\(3\)jpn1
cisco ios 15.3\(3\)jpn2
cisco ios 15.3\(3\)jpn3
cisco ios 15.3\(3\)jpn4
cisco ios 15.3\(3\)jpn5
cisco ios 15.3\(3\)jpn6
cisco ios 15.3\(3\)jpo
cisco ios 15.3\(3\)jpp
cisco ios 15.3\(3\)jpq
cisco ios 15.3\(3\)jpq1
cisco ios 15.3\(3\)jpq2
cisco ios 15.3\(3\)jpq3
cisco ios 15.3\(3\)jpq4
cisco ios 15.3\(3\)jpq5
cisco ios 15.3\(3\)jpr
cisco ios 15.3\(3\)jps
cisco ios 15.3\(3\)jpt
cisco ios 15.3\(3\)jpt1
cisco ios 15.3\(3\)jpt2
cisco ios 15.3\(3\)m
cisco ios 15.3\(3\)m1
cisco ios 15.3\(3\)m2
cisco ios 15.3\(3\)m3
cisco ios 15.3\(3\)m4
cisco ios 15.3\(3\)m5
cisco ios 15.3\(3\)m6
cisco ios 15.3\(3\)m7
cisco ios 15.3\(3\)m8
cisco ios 15.3\(3\)m8a
cisco ios 15.3\(3\)m9
cisco ios 15.3\(3\)m10
cisco ios 15.4\(1\)cg
cisco ios 15.4\(1\)cg1
cisco ios 15.4\(1\)sy
cisco ios 15.4\(1\)sy1
cisco ios 15.4\(1\)sy2
cisco ios 15.4\(1\)sy3
cisco ios 15.4\(1\)sy4
cisco ios 15.4\(1\)t
cisco ios 15.4\(1\)t1
cisco ios 15.4\(1\)t2
cisco ios 15.4\(1\)t3
cisco ios 15.4\(1\)t4
cisco ios 15.4\(2\)cg
cisco ios 15.4\(2\)t
cisco ios 15.4\(2\)t1
cisco ios 15.4\(2\)t2
cisco ios 15.4\(2\)t3
cisco ios 15.4\(2\)t4
cisco ios 15.5\(1\)s
cisco ios 15.5\(1\)s1
cisco ios 15.5\(1\)s2
cisco ios 15.5\(1\)s3
cisco ios 15.5\(1\)s4
cisco ios 15.5\(1\)sy
cisco ios 15.5\(1\)sy1
cisco ios 15.5\(1\)sy2
cisco ios 15.5\(1\)sy3
cisco ios 15.5\(1\)sy4
cisco ios 15.5\(1\)sy5
cisco ios 15.5\(1\)sy6
cisco ios 15.5\(1\)sy7
cisco ios 15.5\(1\)sy8
cisco ios 15.5\(1\)sy9
cisco ios 15.5\(1\)sy10
cisco ios 15.5\(1\)sy11
cisco ios 15.5\(1\)sy12
cisco ios 15.5\(1\)sy13
cisco ios 15.5\(1\)sy14
cisco ios 15.5\(1\)sy15
cisco ios 15.5\(1\)t
cisco ios 15.5\(1\)t1
cisco ios 15.5\(1\)t2
cisco ios 15.5\(1\)t3
cisco ios 15.5\(1\)t4
cisco ios 15.5\(2\)s
cisco ios 15.5\(2\)s1
cisco ios 15.5\(2\)s2
cisco ios 15.5\(2\)s3
cisco ios 15.5\(2\)s4
cisco ios 15.5\(2\)t
cisco ios 15.5\(2\)t1
cisco ios 15.5\(2\)t2
cisco ios 15.5\(2\)t3
cisco ios 15.5\(2\)t4
cisco ios 15.5\(3\)m
cisco ios 15.5\(3\)m0a
cisco ios 15.5\(3\)m1
cisco ios 15.5\(3\)m2
cisco ios 15.5\(3\)m3
cisco ios 15.5\(3\)m4
cisco ios 15.5\(3\)m4a
cisco ios 15.5\(3\)m5
cisco ios 15.5\(3\)m6
cisco ios 15.5\(3\)m6a
cisco ios 15.5\(3\)m7
cisco ios 15.5\(3\)m8
cisco ios 15.5\(3\)m9
cisco ios 15.5\(3\)m10
cisco ios 15.5\(3\)s
cisco ios 15.5\(3\)s0a
cisco ios 15.5\(3\)s1
cisco ios 15.5\(3\)s1a
cisco ios 15.5\(3\)s2
cisco ios 15.5\(3\)s3
cisco ios 15.5\(3\)s4
cisco ios 15.5\(3\)s5
cisco ios 15.5\(3\)s6
cisco ios 15.5\(3\)s6a
cisco ios 15.5\(3\)s6b
cisco ios 15.5\(3\)s7
cisco ios 15.5\(3\)s8
cisco ios 15.5\(3\)s9
cisco ios 15.5\(3\)s9a
cisco ios 15.5\(3\)s10
cisco ios 15.5\(3\)sn
cisco ios 15.6\(1\)s
cisco ios 15.6\(1\)s1
cisco ios 15.6\(1\)s2
cisco ios 15.6\(1\)s3
cisco ios 15.6\(1\)s4
cisco ios 15.6\(1\)t
cisco ios 15.6\(1\)t0a
cisco ios 15.6\(1\)t1
cisco ios 15.6\(1\)t2
cisco ios 15.6\(1\)t3
cisco ios 15.6\(2\)s
cisco ios 15.6\(2\)s1
cisco ios 15.6\(2\)s2
cisco ios 15.6\(2\)s3
cisco ios 15.6\(2\)s4
cisco ios 15.6\(2\)sn
cisco ios 15.6\(2\)sp
cisco ios 15.6\(2\)sp1
cisco ios 15.6\(2\)sp2
cisco ios 15.6\(2\)sp3
cisco ios 15.6\(2\)sp4
cisco ios 15.6\(2\)sp5
cisco ios 15.6\(2\)sp6
cisco ios 15.6\(2\)sp7
cisco ios 15.6\(2\)sp8
cisco ios 15.6\(2\)sp9
cisco ios 15.6\(2\)t
cisco ios 15.6\(2\)t1
cisco ios 15.6\(2\)t2
cisco ios 15.6\(2\)t3
cisco ios 15.6\(3\)m
cisco ios 15.6\(3\)m0a
cisco ios 15.6\(3\)m1
cisco ios 15.6\(3\)m1b
cisco ios 15.6\(3\)m2
cisco ios 15.6\(3\)m2a
cisco ios 15.6\(3\)m3
cisco ios 15.6\(3\)m3a
cisco ios 15.6\(3\)m4
cisco ios 15.6\(3\)m5
cisco ios 15.6\(3\)m6
cisco ios 15.6\(3\)m6a
cisco ios 15.6\(3\)m6b
cisco ios 15.6\(3\)m7
cisco ios 15.6\(3\)m8
cisco ios 15.6\(3\)m9
cisco ios 15.7\(3\)m
cisco ios 15.7\(3\)m0a
cisco ios 15.7\(3\)m1
cisco ios 15.7\(3\)m2
cisco ios 15.7\(3\)m3
cisco ios 15.7\(3\)m4
cisco ios 15.7\(3\)m4a
cisco ios 15.7\(3\)m4b
cisco ios 15.7\(3\)m5
cisco ios 15.7\(3\)m6
cisco ios 15.7\(3\)m7
cisco ios 15.7\(3\)m8
cisco ios 15.7\(3\)m9
cisco ios 15.8\(3\)m
cisco ios 15.8\(3\)m0a
cisco ios 15.8\(3\)m0b
cisco ios 15.8\(3\)m1
cisco ios 15.8\(3\)m1a
cisco ios 15.8\(3\)m2
cisco ios 15.8\(3\)m2a
cisco ios 15.8\(3\)m3
cisco ios 15.8\(3\)m3a
cisco ios 15.8\(3\)m3b
cisco ios 15.8\(3\)m4
cisco ios 15.8\(3\)m5
cisco ios 15.8\(3\)m6
cisco ios 15.8\(3\)m7
cisco ios 15.8\(3\)m8
cisco ios 15.8\(3\)m9
cisco ios 15.9\(3\)m
cisco ios 15.9\(3\)m0a
cisco ios 15.9\(3\)m1
cisco ios 15.9\(3\)m2
cisco ios 15.9\(3\)m2a
cisco ios 15.9\(3\)m3
cisco ios 15.9\(3\)m3a
cisco ios 15.9\(3\)m3b
cisco ios 15.9\(3\)m4
cisco ios 15.9\(3\)m4a
cisco ios 15.9\(3\)m5
cisco ios 15.9\(3\)m6
cisco ios 15.9\(3\)m6a
cisco ios 15.9\(3\)m6b
cisco ios 15.9\(3\)m7
cisco ios 15.9\(3\)m7a
cisco ios 15.9\(3\)m8
cisco ios 15.9\(3\)m8b
cisco ios 15.9\(3\)m9
cisco ios 15.9\(3\)m10
cisco ios 15.9\(3\)m11

{
  "cisaActionDue": "2025-10-20",
  "cisaExploitAdd": "2025-09-29",
  "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
  "cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A45A569-C122-4474-BE14-AF7BA71736BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC516F4-F6DD-460D-BBC4-DD32CC0F1180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD04C1FB-F8F8-486A-9E2F-EB01856B1C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "156D51A0-506C-47FD-BF45-955C1B881976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23468BBF-F5AB-4924-A084-F065BB02BF22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A03544C9-6037-4D88-8D0E-513DFCB4CC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B681843-64AE-4987-B94A-DD9A915846CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022D72E-D7E5-4910-8D0A-D488348D10D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F49E6EE-95D6-4419-BDC7-274F30C53886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B56C494-9925-46DE-B1FA-3D1C46093F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA375C35-61CC-4123-967C-1E4B40673D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C32EAF-90A1-4391-B82D-A1F8E6A83E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA58A8E-D63E-4276-BB92-35B7F4D2760E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "54C51F43-FDA7-4F87-9EA7-3049E6EA17B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "36994E4F-2207-4CD6-8605-9A7D641AC769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF6B43E-2EB9-4D74-8C92-6D5AFDFECF01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.2r:*:*:*:*:*:*:*",
              "matchCriteriaId": "7050DADE-B994-4A5E-A093-EAB6FEF0B3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FE74B7-E21A-4E99-BD60-37BC4C10BD94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81BD856-D376-46EA-9C6E-48DA6C5EA47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE89B334-1927-4359-9CA6-9EFF4A247949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E31772-E8D3-4BC8-B337-B33BCAC4C750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCF5A7C-202D-44F8-97D3-694F876050D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3EA559D-5184-4E19-8A32-ECA41C930AE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "716D8805-D461-4066-9BFD-1EA895E4B997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "7150819E-EFB5-4224-975C-84EDBBB2881D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "E81F4068-35A1-4712-9B88-F6E574B2DE20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "29794A8C-B1CC-492F-9A68-02EEE994743B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CBBDA12-AF2E-400B-979D-3657F1F2C15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7F55DC-38F5-4B19-A699-90E1D302A04B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
              "matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
              "matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
              "matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
              "matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.11e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F70C64B-04FF-49EC-A58D-08729831298C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.12e:*:*:*:*:*:*:*",
              "matchCriteriaId": "334B45D5-14FE-4FB1-9A06-553B7E860D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
              "matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
              "matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
              "matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
              "matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
              "matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
              "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E2A28A-700E-4546-AA94-2B13C925BDFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
              "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
              "matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BDBE176-04ED-48F0-BA9F-45BECFEDBE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E52AA0-0A77-47DF-9600-7D5B8A6D09B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB62FB56-A09A-4BE3-AF4C-180903078C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0627B380-B8E7-4BA4-BC1B-ADBCC3A6018B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.7b:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F75200-396B-43BB-A529-9A3A45B9EBAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E147E53-B047-429F-9E3B-04FB5F777B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0656EA0A-3BB6-49AD-A6BB-922C2BC5B075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EDBECC5-25B6-461F-BE21-F4EA569DAEA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "99810E61-9C5F-4B26-8DFD-75C971593386",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B25CC70F-42ED-42EF-8CC6-50FF1F809F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB60F2D0-B9D2-42A8-85EC-433BCE5BEC24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.5c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB757B3D-14A1-4997-AA51-9870FD81763C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4F9C74B-113E-4808-B979-7738E3A52B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C482977-8384-4A57-B251-39BC01E4F7EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4CC3DA6-7A3D-4AFB-958A-E047D896CDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A18E50D1-BAF5-4C0F-9253-774089BAA2EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FDCA684-FF44-49EB-93B5-ED6778E437BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E0FD5B7-69E7-43CB-A658-E05557AC2D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBDBD9B-7122-413B-8671-17AEBE56C2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855BC9A-3F17-48FF-AE97-46ADB30AD0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E12CD6C1-1441-48E1-89BF-0C9C735B94E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0298ACD6-BAC6-4E0E-9962-3882F90700AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BAB6FF3-7978-47CA-BFBD-6211106C46BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88707E5B-2040-40AB-A8D2-39D6B97E40B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.16.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04A22BF-A461-4B5F-BB30-5F5C2FE56134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F98075-6210-4332-B76E-ECDFF1D55D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A57F16D-2020-46F1-BA1A-DAE484F31920",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19BA770-83E0-4D07-BE31-97FA8C86437B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4627BEF7-CEEB-4CBC-8620-4D9C5A7F7C30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2:*:*:*:*:*:*:*",
              "matchCriteriaId": "866E9A29-97D8-41E1-81BE-73FAF1B5E2DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B72F30BA-0376-426F-9E74-A39231973D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C409330E-2C8F-425F-8A9F-B04E67A83608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8940ECBB-CA08-4292-AA5C-55AB95D98580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C29F00F-1779-46BB-9964-8692AB4AD04F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi5:*:*:*:*:*:*:*",
              "matchCriteriaId": "950F3BA6-DEEB-4EA5-96E3-88B33B0331D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C48E7E3A-61B2-4188-831C-26EB583ECD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C54AA9-EFDB-43A5-AD00-4E9965881927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7497ED9-109E-4B44-8C16-D43F7FA1A326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E9F3020-E327-4DA0-BD2A-22677BEA0629",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B34634-EAEA-4FAC-98DD-E50EB7FE9286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi10:*:*:*:*:*:*:*",
              "matchCriteriaId": "875897DB-094B-41BD-9205-9D4564B52998",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B119CD4-DA82-4F35-B5CD-71E2434C23B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D581EB8-FBAC-4F48-82B5-6F8BEE2D8CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi13:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3855C5-86C9-4408-B644-78E0B17F6F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi14:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B47AFB-BFB5-4DF1-9F05-695BBDC21CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB7463C-01C6-4483-8EF1-1E1257738CD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFE2CEF-595A-4D4D-A741-4562CD03B67F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6EC6DC5-E871-43E3-991E-0EE4B310CA9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj3:*:*:*:*:*:*:*",
              "matchCriteriaId": "102395E9-4110-4C7C-B152-5C60EB17D1DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4200124-000B-49C0-B380-A478C1CF4A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40BAA65-D2A7-42BB-BAD7-C9F7FCE7B123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj6:*:*:*:*:*:*:*",
              "matchCriteriaId": "831B9DB1-8AB9-45A7-8DC4-FD6CED335D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F17158D-9CCD-4186-B97D-51242AB92547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E920061-80A8-41E0-BA64-A20264020C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB5FB44-0CD9-40E1-80EC-C8CFBA023FD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F3509F6-5475-4924-9E5C-4E2E03D65F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
              "matchCriteriaId": "46AE17A1-7FC7-4197-825C-92B32AC64D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00328248-72C7-4646-9312-5EAA7FE0D41E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5535D673-8DF3-4737-A531-E7B28C419235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D97E83-3091-4E46-818C-503D7D1F9D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE109462-C870-4C66-A7AE-B1ADED3B8DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
              "matchCriteriaId": "14D0156C-3153-4A64-8491-A6A1B60FE5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C075F42D-27C1-46A2-893A-5C0D9BE13861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF11222-0EA2-4E6B-B6DC-D16FCFEDE807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63C5C43F-67A3-4000-845E-FDA620AD1B90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "565F3777-89E2-4159-9D8E-629EB7A56837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
              "matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
              "matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC201905-7DBF-4E2B-B732-62641F51C170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
              "matchCriteriaId": "377669B9-952D-4527-9C24-E6713E749C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABC42E8-E304-4D00-8C6C-604F3EE13DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AB39F8-5D39-4E8A-A8A5-B91718D37A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63328822-DC2E-41A3-9E12-F5F824847AFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez2:*:*:*:*:*:*:*",
              "matchCriteriaId": "350D9AFE-66AD-486B-B42D-E6A3CE62640C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez3:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D67BDA-AEA7-4ED2-AFA4-20283B446602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2E6D25-7528-4433-9BB3-4F45DB0FE8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E1ADA5-C782-4F8A-A77C-A895B402A792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
              "matchCriteriaId": "698C897E-CE32-4350-9315-DEE4EA5FF02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez9:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C7FF79-0AFF-4DB5-BDCA-797B8FAB7F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF2B02DE-CE0C-47E1-91BF-F115EE970B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5374A08-2788-40A0-82B5-9597C28396EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C60FD51-3FD8-48F4-98EF-FEDAAF9BC52B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF1CE90-F107-4009-B2E4-19D6123B944D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC92E458-DC3F-4179-B6E6-14562F4291B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1867205D-5158-41BB-8358-1A870E9DE814",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "971AAF00-63AA-4B3F-8E0F-B8FBD011C071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "551A0087-5926-46AF-B1DA-3AA18FAB87E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19A2402-F662-4900-8137-B14EB2537173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5757C194-AF18-434C-9F19-2FC775720556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "3048FEB4-3269-4EE1-88B5-0AA3E681402B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5B2E97-12F4-4B3B-90C6-106667787472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "68BFDF59-CDED-4A52-9E24-673E86B00C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "331D55CC-055A-47E9-9019-B6AEAE0F8576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE53F4B-83D6-4E40-8117-D1983E798CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy5:*:*:*:*:*:*:*",
              "matchCriteriaId": "21941E6C-4DE9-45EA-8B14-CCEF208C458F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC8D765-D1F3-43E9-BCBA-DBC4FA7BAB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C06387D-C32E-4C3A-9A02-C0748DB88D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D754113E-26FE-4E2E-AFF0-680866C32CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0489630E-150D-4C80-8E93-045B89A83631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy9:*:*:*:*:*:*:*",
              "matchCriteriaId": "39832F23-3841-44CA-B1C0-321CA9B59627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD804E72-BAB3-4471-9EB2-11D607895357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ea:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04E6B95-5FD2-4C08-BFFC-148096444DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ea1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB4363E-49B6-4682-AEF3-6B0AB38A3932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
              "matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
              "matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
              "matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
              "matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
              "matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
              "matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
              "matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
              "matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED6E6E2-AB47-442C-93B9-DEBA9D124B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3CC7F08-343B-40CC-9D03-81EE4924D6C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
              "matchCriteriaId": "31444A2D-BBF0-4D6A-A898-5EC4E782CC43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
              "matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
              "matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
              "matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD483E0-66F9-4DD1-85FA-C125C9617E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "35C1075B-11F3-453C-957D-834C5D6D8CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "115E901C-94B4-4EC7-AA85-03A20CFA90DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97051EE-8C42-4546-8EDC-FAD60B3EE1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB435D9A-FA6C-4CBD-8647-3A61B3DAB338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
              "matchCriteriaId": "14181F4B-9A5C-40B4-BD15-FED694E9AE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B62E402E-5D8B-4261-906C-C5668B4A12BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "07DCF559-9324-4CE1-A986-EF4A174DCEFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38CC9728-4E4A-4536-BC81-031AFE1A74E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9DECC49-1DF8-4925-9232-04DA748428B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B736A1E0-89F4-418C-BC12-7E6A7AC7891F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDC0B5A-E59C-454E-AA0E-6EB9C8888480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2363876E-0E3B-44BA-8157-FA96554302B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2D3131A-74F7-4465-826E-5F6C90240C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D1E17-9A5C-4B74-B780-F31364FD9F06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70ADF53-D937-4CB1-8D17-8B4DB9A5458C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0F30A4-C088-4ECC-ABE0-33D4A7BC8D1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*",
              "matchCriteriaId": "73B11B78-1936-42CA-919E-BCD1E0C2A397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A807560F-7111-40AB-BCC8-F3D7A2F92D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE56D89-5894-49E9-BDCF-E23AE4159989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9347AF-7729-44BD-8E33-610D573C560F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DC014A-2CDD-4294-8AEB-9C0B437C1633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AB472D-2158-44DC-A627-8C4D52F476A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC27EED6-7F43-422F-8E61-CDD4E9EDC719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE57C85-794E-405B-841F-A806D32C08EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B91687C-A8F8-45FB-BF03-8534E9230AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E082DB05-253F-4C6F-BD0A-524699309D10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D4858-AE1C-4372-97F9-5983EEE6ED4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9678A6F2-0624-4A8A-9991-9DADCDDB2687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC0B809-72AD-413F-BE84-73FE2DB33950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2834B6-AA9D-4FDC-A228-CED66C799849",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3426024-7199-4B7B-90CB-CE83FD2E0878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF163F6F-1A6D-4AA9-AAC2-52249BB28421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD250CC8-B26A-424E-A737-97F2A7E7C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
              "matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
              "matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
              "matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89D14BC-1718-4AE9-B107-1709C2CE965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jax:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F95DC51-220F-41F9-BC48-E010746C2D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F81AACB-C3F9-454F-A31D-E985451B0105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb2:*:*:*:*:*:*:*",
              "matchCriteriaId": "853F31A7-E4A7-41DC-B6C6-36D5C665B7AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC473A4-39F2-4F32-B268-B9282B0B7823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF758B9D-7E81-4B27-865C-7CE675D38228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb5:*:*:*:*:*:*:*",
              "matchCriteriaId": "99F26328-57B0-4E5F-932D-EEA70DF7C8CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb6:*:*:*:*:*:*:*",
              "matchCriteriaId": "282A8AA5-B087-4F0E-A8B1-4EA811E40270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05373F4-E820-4D22-A86A-904854F04C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C38969D-65EB-4C80-BB2A-A1245C4E718B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A429CFF2-A288-4CD5-9C06-8D18647C67E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3A9655-9E22-4AEA-BBCF-6C0749D0289E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80852CE-8D91-4E85-A97F-C7A9AF5278CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF777880-43BF-4D4A-9BA1-B2E925B5DE11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
              "matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3714E18-9A21-4D04-BB5E-0299AF443E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FE61C7-3B61-4085-AD91-137459DA29D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "71080D8B-BC81-4CDF-8626-D0F35DA40AEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF10596D-457A-4DA8-8037-5E92E1D39232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADFCDD9D-F2C9-431E-BE9C-9A89C5501939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1783208B-3BAD-411B-AE3E-BF7F3C13BEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9843B15-19B6-4A35-9C9A-5B803352A46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3:*:*:*:*:*:*:*",
              "matchCriteriaId": "314FAE74-75CF-4E43-ABC5-826190F49D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "261C2203-4972-45D5-8DA0-83A9AB4D6C51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB9B457-8B4B-4761-A23F-8A99F28E4CCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb3h:*:*:*:*:*:*:*",
              "matchCriteriaId": "2590898B-201F-44EE-91D9-E3A891C974B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE089B8-4176-4618-8C1A-525A8CF96053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb5:*:*:*:*:*:*:*",
              "matchCriteriaId": "32222F6C-960D-4AF6-ABA1-6BED7FEDCFCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb6:*:*:*:*:*:*:*",
              "matchCriteriaId": "981C90B0-43DD-482D-9471-74E4CC5DB0BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6098745-F5CB-4D3B-A04D-E4C1F1382FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37D2CBE-2B93-45CB-AB59-AFDF14277E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2911989-D074-42DF-AB58-6849B3E0B72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34299D29-96EC-4AAA-8137-49B292FC2D67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5092DFCF-FEE9-4BE3-9116-01F3CBCE8A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCBDFC3-13C3-45D3-80C9-E533082FAF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B213D7CC-AD3D-4241-AF59-5B4CFC9BA930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E88FA32-5EBE-44BA-979B-60FE8340E8C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4CE0E6F-A277-48BE-8F1D-BCA48C57666C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FDDD94-40C9-47F0-9D43-0C0267F439C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E77BE16-C28C-43C2-B2CC-5AC4F33F7E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3BBE82-E29A-4FD6-A897-1D80DE6ACA4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0322D5E9-FE05-49EF-A210-A276D69B9F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F188F2EB-60D2-47BB-8FA8-2F832289345E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A2EB46D-16E0-4C31-8634-C33D70B5381A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "7803B445-FE22-4D4B-9F3A-68EFE528195E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21887E28-6DED-4E1D-BC96-FED6461B95F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FAD4038-60A1-43ED-98EA-534B42134FB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB369F67-A688-4AAE-AB69-24ECA7E2DB4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "249D78EB-A125-4731-A41B-62F8302D7246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E599088-5071-469B-980F-4BA3026856C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F58CEE-636B-460E-91D1-330965FA7FE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCA5302F-0F9E-4E0A-AA59-CB23B9A89F32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F943E4AE-F0EE-4643-B34D-44896C8CBF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6ED45F-4479-445D-8970-F90413C51B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8922A697-63B0-480E-B91F-4C16E2F325B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1EB55A-4D3A-42ED-9EA0-DF31DE62086C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3376544F-A13B-4800-952D-08A2F429E9A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA9DD7-A350-4A62-B19A-6AF90CF798F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7113699B-762C-48BD-AD99-19D1A25995E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E178E6C-D717-48B1-B79A-4E071BDFE6AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF7DF14-DD6F-4D24-8F12-AAB145FBDB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71493AA2-49E9-4FF5-AC29-DC2426973EC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E9625-A8CF-4D0F-BB0D-9FB91391D977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja4:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F96295-2E72-4C23-B973-791B4A2B63F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8555124-BAFA-45D4-8208-ED1172D55F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja7:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B9D9B5-807F-494B-9ED2-7F4BDB32432A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6089D71A-8D46-4819-80E9-8A29BCA47EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*",
              "matchCriteriaId": "21678FDA-D2B4-4041-A52D-C7AA562FD086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E532352-99A6-4E45-B0E7-7F04DA411820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9420ADDA-5DD7-4842-AC07-2F5588CA5817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa12:*:*:*:*:*:*:*",
              "matchCriteriaId": "493428E8-D818-4EDF-BA88-E715734BF848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab:*:*:*:*:*:*:*",
              "matchCriteriaId": "915E4321-D52D-4C16-8821-ED16529C9090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAC643B-AA58-42EA-A777-52FCF6065F9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CFB57C3-6CDF-46D1-858D-D5234956653D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax2:*:*:*:*:*:*:*",
              "matchCriteriaId": "330125E6-3645-40B5-8E64-009B622090B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D874DF-54A1-47C7-B3D9-A9CE41A42418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb:*:*:*:*:*:*:*",
              "matchCriteriaId": "1485E3A5-A586-408A-8325-7572779DD0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2244E538-6B35-44E0-B93E-60B773745A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9DB6B2A-19D2-4684-B07F-5D42EC850A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC1C381-4795-4992-BE3C-9615E005DE46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*",
              "matchCriteriaId": "80188F84-30DE-46AC-8E0C-984126B77CC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECBF0A9-D84F-40A2-AC61-A9C59C819787",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F129CF-FB92-49E9-BD86-90DDB8218FF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C288D58-F765-4403-BF18-CC0A62B1AA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1046E19B-DB53-418A-BFEC-5CD4492E6626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0062D992-D990-4EC9-BABD-2EFFF84254D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC81B74C-4F63-46E8-ACF4-EB707853580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C779C9-3B83-4B26-8942-B8475FB3B5D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "02ACA99D-5784-4F5F-AB83-F55DF8774E94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFFB9F99-8751-442B-9419-C2AB522D2ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E33FD88-8183-40EF-97A1-2766A4BBFBE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6135D11-F4C2-4B6C-BC63-1132499D64A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B43CA9C-977B-4C99-A520-0BCDA5D2A700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDCD3CA-FAA4-4BCA-883B-B871B8748C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D7D48C-9FA1-45DB-B206-437E8ECBF53D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3626B216-43E8-4E60-96E5-7CAA0CB67F65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B59D8B-E71A-4671-BA0B-00E56498E280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*",
              "matchCriteriaId": "956C0089-E5AE-4289-B6D7-A8AB3C39AAA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*",
              "matchCriteriaId": "333468BC-41F0-46ED-9561-D7D2CE6AC267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DBAA17-61D7-4EE4-A70D-A7200DF36C58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF17EADC-5812-47FD-A243-287837CEC1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8CF99C-B097-4964-B07C-FBB28EB37681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2403659-B7AD-40CE-AF88-FE2BEF0929E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1F53B1-E9FA-4480-8314-C531073B25CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*",
              "matchCriteriaId": "498030A3-0AFF-4D74-98D6-74C9447E5B79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCBDB71-59D7-481E-84FF-8772930F857B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5906E4-31B7-45B6-B7D4-493B64741D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda8:*:*:*:*:*:*:*",
              "matchCriteriaId": "09807F0F-E487-447B-8A79-96CB90858891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda9:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A21ED6-B633-4B59-BD32-128D0E2B3563",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7AF17D-2E1E-47D7-9356-4185A5F09BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda13:*:*:*:*:*:*:*",
              "matchCriteriaId": "09664703-4AF6-4213-AB74-9294DE80E648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda14:*:*:*:*:*:*:*",
              "matchCriteriaId": "638B3FE5-39B1-47E7-B975-A2A88C68B573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda16:*:*:*:*:*:*:*",
              "matchCriteriaId": "04D5820C-2E74-4C66-932C-00FF3D064F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda17:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F67B44-4215-48BC-A4DA-279178C4A6A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*",
              "matchCriteriaId": "2955A319-04AC-4D0C-80B7-0C90503908C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EF13B6-A743-41D1-BB31-F17C3586C8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*",
              "matchCriteriaId": "37875B18-434B-4218-BAAF-2B593E188180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26BAC234-D00C-4407-A1FE-E45A14D1BDAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42E2869-F179-49B7-A4E8-0F4E8EA953CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A58711A-F8C9-4F25-97D7-AE8AE64F3912",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE3ECC04-345F-4DAE-98F7-04E082BAEC3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A919122-DE62-4032-80DF-F77C1D80B387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68958043-1212-42AF-A205-DB731ED55114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12:*:*:*:*:*:*:*",
              "matchCriteriaId": "84AE6EB6-EF3F-4DE2-ABEC-71F9010BFF0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12i:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6F56B5-BE84-434D-AEC8-EB0764A832FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14:*:*:*:*:*:*:*",
              "matchCriteriaId": "786741B1-2502-4F2F-A943-C50720A73D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14i:*:*:*:*:*:*:*",
              "matchCriteriaId": "02693A73-85AE-4AFE-81B2-11A85251CBD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf15:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EFE0BC-2487-458C-B8AB-33600B9EB986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*",
              "matchCriteriaId": "746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB02DEB-81D4-4A05-BDD5-3B8BC7184159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*",
              "matchCriteriaId": "B18C3383-28B0-435E-AF08-9739DADAE4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08C9CA39-3515-4226-8453-0B5FC62546D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1658FFCF-7433-4AFB-9D59-BD6CC14A4D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2CA6116-2C6B-431B-BA88-63B180A00DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2377350-7B69-4C49-889A-D63A3E4C1002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2913C352-E21F-4ECE-8A13-BA21CC00D02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD90F4A-2A86-4A98-A157-D93C382717A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*",
              "matchCriteriaId": "1739E9AD-154D-40C2-A761-F7133BC06C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA700809-C25D-49F8-B930-7459F8AE9DCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AEB7B3E-4E91-477F-BD62-9A28578CCA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2:*:*:*:*:*:*:*",
              "matchCriteriaId": "58C5D255-C0FE-47E6-A920-3539306F9845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8DF3B4-A424-4B70-9116-28E2C4DFB776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4677B840-6636-4D8C-9E1C-47FEB8F3116A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk4:*:*:*:*:*:*:*",
              "matchCriteriaId": "917D5477-E47E-4A01-979A-C9A0993BE34B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EC7701-3B46-4CFE-9EE5-2EA393D5A6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E18F8C6-E592-4507-8B93-E9AEA5C12CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9881DB-6F66-41D6-8AEE-7DAE4FFF42E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F80E00B5-6C40-4DB1-8C6D-4B90D968C5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4726B615-ED6B-42ED-9E7B-7161293AC439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk8b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6690746A-4F0B-40CC-BD38-C9F2046A16D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk9:*:*:*:*:*:*:*",
              "matchCriteriaId": "603287B7-170D-4233-B6E7-0E5AA489275D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E324F1-4F76-403D-A98C-49C015CBC538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk11:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E99B6F-4810-4493-B5E6-35514525F614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D6C6EE-CFD9-49A9-8784-498560847737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFEE60A6-9E75-4B20-A06D-411E774511B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1451BB33-6BE0-4F4A-A193-14E13DECEE20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F0FC09E-8C60-4EAC-B729-3BE3524E6F08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC3CD43-F30A-484B-9285-D925C1262212",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F807A36A-9363-40F1-9B20-E5C4D503EB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5200C1CD-DEAB-44FD-970D-098F3E01F36B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8E71841-512D-483C-A911-86EA745AC00E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB655C5-2D7B-4ED5-89D6-4ED613CF3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE556AB-093C-4992-8F5B-F240526AAA64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA0BCD1-4E75-4F39-B960-4B6B1B357442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17F3285-80E8-4BE5-8704-3379CF326601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9669DF61-DDC5-498D-906A-494D56BAE450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "571ECF0D-06C6-4371-891C-FB68A3093F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A38CF1F-37D9-4CBD-8B98-C24637FF7F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0886F6DC-C590-48A0-BE27-6CD778EB37FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8552242D-0A93-4841-83F9-EA4D7F58938E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*",
              "matchCriteriaId": "F45D0EFD-784A-4CDB-8FDB-41F6869B4735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "942CC01D-ED6E-4731-A61B-75CDF219F760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59CA018E-5160-40AE-953D-9559F23D2EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBA595EF-8718-4477-8EEC-EA948C14F091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*",
              "matchCriteriaId": "13763901-2D7B-485D-A957-E30587BCEB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B213166-77E2-4E13-8769-FA8AF6EEC33A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3C0371-223A-433C-B8A3-C24A499EB82F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A066A001-830B-4407-A5CD-AB99059C190E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "83B45095-526D-4BC5-A16B-6B5741F07FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpd:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A2E770-2D7A-4A09-AE89-B58F01FDE1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6546067-A0AD-4BCB-8519-1DF018EBF804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE13E73-F2E2-4F8D-B236-940C74335E3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E08CCB1-054E-4ABB-8A68-5DC5D8464ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E790F111-F2C4-4898-BC24-D09C213F62DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi7:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A0E2C0-519E-4DFA-897E-DF5DE59434A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "00D510BB-FB26-4991-BCB7-9E79EBD195A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AADEEE-6B71-4A4E-B33D-BEA65B9CB0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi10:*:*:*:*:*:*:*",
              "matchCriteriaId": "52CE3939-470F-47B8-8C2D-AF5F109FC971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BF63D2-734D-41F4-8FE0-7F07F482AA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2t:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4E1437-2511-40ED-848A-FFE4542D8B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3:*:*:*:*:*:*:*",
              "matchCriteriaId": "568E1EE8-78E7-4E24-88D1-9D42DE500F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F71B84-9188-4333-95B1-0801F03BC496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42E49E0-08A9-49DF-B67D-537618A8881A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj5:*:*:*:*:*:*:*",
              "matchCriteriaId": "806D68A3-6E80-4184-A5D7-FBA718B66BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj6:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BEDA52-B21D-4693-8E70-88350FDCACD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E2365E7-F80F-430D-8F23-04191DE26DDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7c:*:*:*:*:*:*:*",
              "matchCriteriaId": "E49AB188-17B6-4C2E-BC79-D4B410F38BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9D272C6-4455-4B42-813D-900862918F33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E98F9CB3-F6D1-484A-B6CF-7C7FD78AEC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj10:*:*:*:*:*:*:*",
              "matchCriteriaId": "905019E4-5C39-43C6-987F-722E3B08D15F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB14CD5-5085-4859-8E88-67B6F4A4ACA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6F2D03-4959-4AF3-ABEC-77751C40A2DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5AE65B-2974-47D5-9023-AA1FB2031DF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk2:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B2299C-0303-4E0B-B194-7404F8C7FF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DFB3D9-013F-45B9-8E03-2CA8EF23A05F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDACFAF-95E5-420F-B546-CD4CCCBF3743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk5:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D2B2C1-8A01-4F50-A9F9-1758C9060367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7D84D9-291C-4E6C-8B67-BF51E910C812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE75D4F-AD71-4923-B00B-0EC835CC9CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA1A49E-C1BE-4BF3-A3D4-F00C12519808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E99C3F-14E6-433E-8B4F-5A196484EE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpl:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D6BE0-305A-432D-A0F1-55FD119FDC2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpm:*:*:*:*:*:*:*",
              "matchCriteriaId": "889E740C-2EED-4C9F-A532-0B13D257CE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn:*:*:*:*:*:*:*",
              "matchCriteriaId": "F605F3D7-F81A-406C-8846-A4174688A803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AE012B-3E8D-4DA2-8D9A-FACBE23F4E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7E6D57-FDA9-48B8-8193-C205C1D88369",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D040F774-2BCD-4093-B340-3D1D983AF0BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA9E7FF5-3647-4FD2-AB0F-4092786BE7AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A7267E3-F70A-492F-85E6-12F4AC6D38AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpn6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5830929-5087-450B-AB3E-F1E03828C4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpo:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC346170-9412-4CA5-9BE2-73F72C81A24A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpp:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1EA81C-A137-41A2-89AF-174E233AAA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq:*:*:*:*:*:*:*",
              "matchCriteriaId": "58BEC384-3525-4BE2-AC0B-E2718387B77E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A89EC5B6-C9F6-41BB-95DB-663D0121BBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq2:*:*:*:*:*:*:*",
              "matchCriteriaId": "967AF15C-411D-4BB9-906E-38D74D02F82F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq3:*:*:*:*:*:*:*",
              "matchCriteriaId": "73487EBB-9EB4-4048-B0C8-964D0BE330E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2992B552-AB8C-4D7E-AAAD-F28586BF8FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpq5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD00E777-723E-42D5-AE2E-67B08603BD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpr:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB21DC4-1946-44E0-BAAE-78255BFAEA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jps:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B75123-1D99-487A-B9EE-5F4411AF845E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpt:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BED107-3A18-4F09-BF8A-B712F9DE8B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpt1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAFF110-4F3D-4FF5-95B8-16CACA58DC87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpt2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E517D85B-CD2E-4132-A019-5C7176C72117",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "499C6196-2D34-4312-9C3E-B1A6E8D21112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9279A96A-43B2-4FD4-97F0-DA331EACF918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3479B06E-1B67-4399-BA3A-E02331E21BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7855CC38-5E3E-486D-9322-7BF0DC1FF623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "496E2D60-AEEF-4D34-ABE4-9A9B101643D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A740BDE4-B65E-4F6F-BAB7-BBA64567EC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F391FDE-A48C-4F59-BC6F-7880B234E3A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E10916E9-6105-46F9-993D-F09C223003B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2E9E28-64F4-469C-8F01-FC2290B57106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
              "matchCriteriaId": "D962FBA3-CE59-401B-9451-45001775BA66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13F2837-174B-4437-BF3F-CB6BFBF8F64D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "4220D3B1-BD05-4169-91BA-B1AA45084C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "84BAF351-4C7F-44F8-812E-9C402CBBB5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595F3D8-8D99-4C82-9EC1-1187C52A6740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "662ACAD0-7E80-4CB5-8409-03E72A3C59D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A43EE852-5F22-4387-8332-A12FF3306210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
              "matchCriteriaId": "02866AED-A1B4-4D89-A11F-27089EF935BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A96A92-02E7-440C-9E46-0FBE8CE75E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F1AEF3-08BD-4CC0-A36A-D26D550853E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD9FF45-C8C2-42E2-B329-48C037A10521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36CBB93A-A8C8-477E-B530-B0058C3D15B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D029D52-65E5-4129-AB47-E873F53799CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*",
              "matchCriteriaId": "727E596A-295D-4D70-810A-436FC6A4415D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*",
              "matchCriteriaId": "368210A0-CC15-4FB9-8334-4ED475523C2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C258F34-C557-4586-A8D0-590EC37E252E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD456B15-1AFC-470A-9750-E6D152869FB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B940A51-E9B1-430B-A732-F1B65F54CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93140A3-E0C8-4817-802A-27CBFCD40A65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0EE8DB0-15BE-4A3A-B4B2-1C1EAC0AD6ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A643053-8500-4805-84E4-4FB583C0D4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05AEB-5455-4854-ABA5-35BABC07F4A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6994F100-864F-4512-9141-F7D1050F9DD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0CC364-FF3A-4FB3-8004-6628400BC7DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF08E7CE-DE01-43B2-A9F0-1CE657E79260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC500D08-0DE1-4AA8-AE97-0CF17A706430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F5D3761-16C8-413A-89AD-C076B9B92FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F690BEC9-FAE9-4C02-9993-34BF14FA99EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "716EC9AA-0569-4FA7-A244-1A14FA15C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "39166A66-859D-43A7-9947-3F3C32FBFAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F421AC3C-B0BC-4177-ACDB-87792C1636EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "09CD336D-1110-4B0C-B8D4-7C96293CBADE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD51F00-C219-439F-918E-9AF20A6E053A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BCB671-7ED0-43D5-894F-8B3DBF44E68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4802BC7-F326-4F6E-9C74-04032FF35FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDE3BCF-B518-47B0-BD3B-0B75515771E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B0621A-D7A2-415B-91ED-674F2FB4227B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB52603C-CED4-4330-BB53-DDDFEA83882A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C9B84C-F9DC-4F9E-82F2-04004D539C36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE884ADE-FD51-4F10-89A8-D871E7407C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC22B2CD-5154-4055-A6A7-4C31B84B032B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "10082A46-7AD3-4533-9A15-267953D9E642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ADD1575-BB35-40CE-8452-3D34E25995B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*",
              "matchCriteriaId": "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B02867-F082-4A57-9E2E-12B0F4C77526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8389200-0585-456E-8D0B-D725266ADBBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
              "matchCriteriaId": "C84498B4-7002-44D1-B2B7-B43F3081D258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F61B07A-7933-476F-951A-AD0019D2443D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*",
              "matchCriteriaId": "41939712-5075-4924-ABF2-467430B37197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*",
              "matchCriteriaId": "945363EE-FE7A-44ED-A4A0-942A1F9B2702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*",
              "matchCriteriaId": "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B843CEE5-4D53-414D-95C7-4BA515818E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72480900-6E08-425F-965D-143B348E374A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBA0926-E790-4B1C-A549-5B7D2F040E5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E903D9F-530D-4597-ABA9-4C1CFB79814B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5060BAEA-DF8F-4B85-84F5-1410FD45C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB56857D-029C-4DA8-B439-F1B89EA32074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F91AC2D-86F7-4618-A31B-DE081D4C21BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D25B94F9-F10F-47CE-8340-CE56E7ED31E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C32C536-640C-468D-872F-442697DB9EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38DE4F33-A677-4848-BB33-10C4A4655735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0894FC09-880C-44D5-B67D-81C92D96D790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
              "matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7561E37E-E7B9-419F-949F-B8EF52DF00DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FAF397C-C67F-488A-8346-CF37F9B7305C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m5:*:*:*:*:*:*:*",
              "matchCriteriaId": "730D29C4-2BC5-478C-AAFD-E8CF598A5CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CCCEF9-1956-41BA-8E82-925BA98A4874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0F9F49-F517-4646-B94B-A0BF4F9D6315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A31DB6-3A66-408C-8E36-2E4EE7C62E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7:*:*:*:*:*:*:*",
              "matchCriteriaId": "68A9E030-2999-4881-8EDE-4F6DED01DD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "98368F1D-5B9E-4A8A-B210-227FA95A555A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC217770-5C14-4492-A41A-B46350A529F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D399E4E-3C90-4E74-8921-BB19FB5B64F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3209BA66-72D4-4CC9-9176-02E14F9553ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m10:*:*:*:*:*:*:*",
              "matchCriteriaId": "543B26D7-9950-4B3E-A189-2F6DE5756C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB3533E7-489E-4775-9CB2-2C545BA3EE63",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP."
    }
  ],
  "id": "CVE-2025-20352",
  "lastModified": "2025-10-28T13:58:42.437",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-09-24T18:15:36.930",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-20151

Vulnerability from fkie_nvd - Published: 2025-05-07 18:15 - Updated: 2025-08-05 14:33
Summary
A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration. This vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied. Note: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials. For more information, see the section of this advisory.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A45A569-C122-4474-BE14-AF7BA71736BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC516F4-F6DD-460D-BBC4-DD32CC0F1180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD04C1FB-F8F8-486A-9E2F-EB01856B1C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "156D51A0-506C-47FD-BF45-955C1B881976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23468BBF-F5AB-4924-A084-F065BB02BF22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A03544C9-6037-4D88-8D0E-513DFCB4CC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B681843-64AE-4987-B94A-DD9A915846CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022D72E-D7E5-4910-8D0A-D488348D10D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F49E6EE-95D6-4419-BDC7-274F30C53886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B56C494-9925-46DE-B1FA-3D1C46093F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA375C35-61CC-4123-967C-1E4B40673D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C32EAF-90A1-4391-B82D-A1F8E6A83E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0350E16B-1FEF-4D4F-B520-B53EA3DA29A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA58A8E-D63E-4276-BB92-35B7F4D2760E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "90EBD3C8-5749-4EB7-976F-8749A44E483A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCC3D6A-BE62-45AA-BCDB-B8437D841BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0E839C-B7D5-4201-9052-0CC0BD925E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9044701-2609-4E70-BA19-DB4831FCFD3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7AC209-B78A-48F3-BC3B-C1F04CA19B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9422E331-2013-4FF5-A06D-50505DF15123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "54C51F43-FDA7-4F87-9EA7-3049E6EA17B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5605246-622D-47C6-987D-9404A32820F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C251E2-16DF-4FF1-8243-D191C463738B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "36994E4F-2207-4CD6-8605-9A7D641AC769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF6B43E-2EB9-4D74-8C92-6D5AFDFECF01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.2r:*:*:*:*:*:*:*",
              "matchCriteriaId": "7050DADE-B994-4A5E-A093-EAB6FEF0B3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FE74B7-E21A-4E99-BD60-37BC4C10BD94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81BD856-D376-46EA-9C6E-48DA6C5EA47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE89B334-1927-4359-9CA6-9EFF4A247949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E31772-E8D3-4BC8-B337-B33BCAC4C750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration.\r\n\r\nThis vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied.\r\nNote: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials.\r\nFor more information, see the  section of this advisory."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la implementaci\u00f3n del Protocolo Simple de Administraci\u00f3n de Redes Versi\u00f3n 3 (SNMPv3) de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto autenticado sondee un dispositivo afectado mediante SNMP, incluso si el dispositivo est\u00e1 configurado para denegar el tr\u00e1fico SNMP de una fuente no autorizada o si el nombre de usuario SNMPv3 se ha eliminado de la configuraci\u00f3n. Esta vulnerabilidad existe debido a la forma en que se almacena la configuraci\u00f3n de SNMPv3 en la configuraci\u00f3n de inicio de Cisco IOS Software y Cisco IOS XE Software. Un atacante podr\u00eda explotar esta vulnerabilidad sondeando un dispositivo afectado desde una direcci\u00f3n de origen que deber\u00eda haber sido denegada. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar operaciones SNMP desde una fuente que deber\u00eda haber sido denegada. Nota: El atacante no tiene control sobre la configuraci\u00f3n de SNMPv3. Para explotar esta vulnerabilidad, el atacante debe tener credenciales de usuario SNMPv3 v\u00e1lidas. Para obtener m\u00e1s informaci\u00f3n, consulte la secci\u00f3n de este aviso."
    }
  ],
  "id": "CVE-2025-20151",
  "lastModified": "2025-08-05T14:33:40.830",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-05-07T18:15:37.007",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpv3-qKEYvzsy"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-20373

Vulnerability from fkie_nvd - Published: 2024-11-15 15:15 - Updated: 2025-08-01 18:22
Summary
A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.  This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials. SNMP with IPv6 ACL configurations is not affected. For more information, see the section of this advisory.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD04C1FB-F8F8-486A-9E2F-EB01856B1C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "156D51A0-506C-47FD-BF45-955C1B881976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23468BBF-F5AB-4924-A084-F065BB02BF22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A03544C9-6037-4D88-8D0E-513DFCB4CC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B681843-64AE-4987-B94A-DD9A915846CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022D72E-D7E5-4910-8D0A-D488348D10D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F49E6EE-95D6-4419-BDC7-274F30C53886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B56C494-9925-46DE-B1FA-3D1C46093F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA375C35-61CC-4123-967C-1E4B40673D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C32EAF-90A1-4391-B82D-A1F8E6A83E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0350E16B-1FEF-4D4F-B520-B53EA3DA29A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA58A8E-D63E-4276-BB92-35B7F4D2760E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "90EBD3C8-5749-4EB7-976F-8749A44E483A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCC3D6A-BE62-45AA-BCDB-B8437D841BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0E839C-B7D5-4201-9052-0CC0BD925E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9044701-2609-4E70-BA19-DB4831FCFD3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7AC209-B78A-48F3-BC3B-C1F04CA19B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FE74B7-E21A-4E99-BD60-37BC4C10BD94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81BD856-D376-46EA-9C6E-48DA6C5EA47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E31772-E8D3-4BC8-B337-B33BCAC4C750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.\u0026nbsp;\r\n\r\nThis vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.\r\nSNMP with IPv6 ACL configurations is not affected.\r\nFor more information, see the  section of this advisory."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la implementaci\u00f3n de la caracter\u00edstica de lista de control de acceso (ACL) IPv4 del Protocolo simple de administraci\u00f3n de redes (SNMP) de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado realice un sondeo SNMP de un dispositivo afectado, incluso si est\u00e1 configurado para denegar el tr\u00e1fico SNMP. Esta vulnerabilidad existe porque Cisco IOS Software y Cisco IOS XE Software no admiten ACL IPv4 extendidas para SNMP, pero s\u00ed permiten a los administradores configurar ACL IPv4 con nombre extendidas que se adjuntan a la configuraci\u00f3n del servidor SNMP sin un mensaje de advertencia. Esto puede provocar que no se aplique ninguna ACL al proceso de escucha SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad realizando un sondeo SNMP de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar operaciones SNMP que deber\u00edan denegarse. El atacante no tiene control sobre la configuraci\u00f3n de la ACL de SNMP y a\u00fan necesitar\u00eda una cadena de comunidad de SNMP versi\u00f3n 2c (SNMPv2c) v\u00e1lida o credenciales de usuario de SNMP versi\u00f3n 3 (SNMPv3). SNMP con configuraciones de ACL de IPv6 no se ve afectado. Para obtener m\u00e1s informaci\u00f3n, consulte la secci\u00f3n de este aviso."
    }
  ],
  "id": "CVE-2024-20373",
  "lastModified": "2025-08-01T18:22:14.640",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-15T15:15:06.823",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uwBXfqww"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-20455

Vulnerability from fkie_nvd - Published: 2024-09-25 17:15 - Updated: 2024-10-24 19:47
Summary
A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability.
Impacted products
Vendor Product Version
cisco ios_xe 17.1.1
cisco ios_xe 17.1.1a
cisco ios_xe 17.1.1s
cisco ios_xe 17.1.1t
cisco ios_xe 17.1.3
cisco ios_xe 17.2.1
cisco ios_xe 17.2.1a
cisco ios_xe 17.2.1r
cisco ios_xe 17.2.1v
cisco ios_xe 17.2.2
cisco ios_xe 17.2.3
cisco ios_xe 17.3.1
cisco ios_xe 17.3.1a
cisco ios_xe 17.3.1w
cisco ios_xe 17.3.1x
cisco ios_xe 17.3.1z
cisco ios_xe 17.3.2
cisco ios_xe 17.3.2a
cisco ios_xe 17.3.3
cisco ios_xe 17.3.4
cisco ios_xe 17.3.4a
cisco ios_xe 17.3.4b
cisco ios_xe 17.3.4c
cisco ios_xe 17.3.5
cisco ios_xe 17.3.5a
cisco ios_xe 17.3.5b
cisco ios_xe 17.3.6
cisco ios_xe 17.3.7
cisco ios_xe 17.3.8
cisco ios_xe 17.3.8a
cisco ios_xe 17.4.1
cisco ios_xe 17.4.1a
cisco ios_xe 17.4.1b
cisco ios_xe 17.4.2
cisco ios_xe 17.4.2a
cisco ios_xe 17.5.1
cisco ios_xe 17.5.1a
cisco ios_xe 17.6.1
cisco ios_xe 17.6.1a
cisco ios_xe 17.6.1w
cisco ios_xe 17.6.1x
cisco ios_xe 17.6.1y
cisco ios_xe 17.6.1z
cisco ios_xe 17.6.1z1
cisco ios_xe 17.6.2
cisco ios_xe 17.6.3
cisco ios_xe 17.6.3a
cisco ios_xe 17.6.4
cisco ios_xe 17.6.5
cisco ios_xe 17.6.5a
cisco ios_xe 17.6.6
cisco ios_xe 17.6.6a
cisco ios_xe 17.7.1
cisco ios_xe 17.7.1a
cisco ios_xe 17.7.1b
cisco ios_xe 17.7.2
cisco ios_xe 17.8.1
cisco ios_xe 17.8.1a
cisco ios_xe 17.9.1
cisco ios_xe 17.9.1a
cisco ios_xe 17.9.1w
cisco ios_xe 17.9.1x
cisco ios_xe 17.9.1x1
cisco ios_xe 17.9.1y
cisco ios_xe 17.9.1y1
cisco ios_xe 17.9.2
cisco ios_xe 17.9.2a
cisco ios_xe 17.9.3
cisco ios_xe 17.9.3a
cisco ios_xe 17.9.4
cisco ios_xe 17.9.4a
cisco ios_xe 17.9.5
cisco ios_xe 17.9.5a
cisco ios_xe 17.9.5b
cisco ios_xe 17.10.1
cisco ios_xe 17.10.1a
cisco ios_xe 17.10.1b
cisco ios_xe 17.11.1
cisco ios_xe 17.11.1a
cisco ios_xe 17.11.99sw
cisco ios_xe 17.12.1
cisco ios_xe 17.12.1a
cisco ios_xe 17.12.1w
cisco ios_xe 17.12.2
cisco ios_xe 17.12.2a
cisco ios_xe 17.13.1
cisco ios_xe 17.13.1a
cisco ios_xe_sd-wan 17.5.1a
cisco ios_xe_sd-wan 17.6.1a
cisco ios_xe_sd-wan 17.6.2
cisco ios_xe_sd-wan 17.6.4
cisco ios_xe_sd-wan 17.7.1a
cisco ios_xe_sd-wan 17.8.1a
cisco ios_xe_sd-wan 17.9.1a
cisco ios_xe_sd-wan 17.9.2a
cisco ios_xe_sd-wan 17.9.3a
cisco ios_xe_sd-wan 17.9.4
cisco ios_xe_sd-wan 17.10.1a
cisco ios_xe_sd-wan 17.11.1a
cisco ios_xe_sd-wan 17.12.1a
cisco ios_xe_sd-wan 17.13.1a

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
              "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AD0EE7-90D6-446C-AF16-FA1110AC470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.6.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0B0C1F-9D10-48E7-BE69-0143A45D3EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F380EA8-8A31-46D0-9FFD-6B6CD24C5ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE315D8-FED1-4F83-B7A6-B211E91168CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1609BF92-B0FD-4D45-8605-492C71B334A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7CEBF6-8D1D-40E4-9854-3A9C38ACAB86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB324BF-9415-4B70-BF11-AC20481F9FDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.9.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE462494-BC2A-420E-87C8-07170CA2D84C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD114AA0-3EA1-4BA0-B04A-924CBAA7DC41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBF2D46-7D17-43CB-B3B2-130A8C2B39B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB8F04EF-2B0B-48B9-938F-58F2E9D6622D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B35CEF2A-3905-40AF-A582-F0D77FD48058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "227945F0-83AD-4B29-8CFE-4DE6206DBE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:17.13.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E54227CC-A1B1-4533-810E-E460B6E942BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el proceso que clasifica el tr\u00e1fico que se dirige al componente Unified Threat Defense (UTD) del software Cisco IOS XE en modo controlador podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad existe porque UTD maneja incorrectamente ciertos paquetes cuando esos paquetes salen de un t\u00fanel IPsec SD-WAN. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico manipulado a trav\u00e9s de un t\u00fanel IPsec SD-WAN que est\u00e9 configurado en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo se recargue, lo que da como resultado una condici\u00f3n de DoS. Nota: Los t\u00faneles SD-WAN que est\u00e1n configurados con Encapsulaci\u00f3n de enrutamiento gen\u00e9rico (GRE) no se ven afectados por esta vulnerabilidad."
    }
  ],
  "id": "CVE-2024-20455",
  "lastModified": "2024-10-24T19:47:49.750",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-09-25T17:15:16.827",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-371"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20035

Vulnerability from fkie_nvd - Published: 2023-03-23 17:15 - Updated: 2024-11-21 07:40
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16266B9E-E613-45FA-A02B-51EED8BEFCC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF365FC4-46E3-4564-9F25-1C2FBE70057B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F374DC-B9F7-4515-A064-01BB436CA984",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE9EABE0-5FB0-4277-A389-87732E750B7C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7E8914-7B25-4097-8B22-6928C1F03D5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B207857B-C483-47DF-9FC7-6A05B866BF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04AB61E9-0148-495E-BD21-64D52DE60A6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D2C587-E95B-4E74-88CF-5930072258D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74270062-2030-45A0-9C93-C1F3B7C88E8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8B0B49-2C99-410B-B011-5B821C5992FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory."
    }
  ],
  "id": "CVE-2023-20035",
  "lastModified": "2024-11-21T07:40:24.403",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-23T17:15:14.030",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-146"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20850

Vulnerability from fkie_nvd - Published: 2022-09-30 19:15 - Updated: 2024-11-21 06:43
Summary
A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3970BA7-2CD6-4DC1-BEBC-03662C88DA94",
              "versionEndExcluding": "18.4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A3197B1-2306-4B0B-96A2-52BB369EE79C",
              "versionEndExcluding": "18.4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12016C30-65D9-4508-B138-0F612736CBF2",
              "versionEndExcluding": "18.4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "052AA171-9B26-4D76-ADA5-1984759AEFB6",
              "versionEndExcluding": "16.10.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A94AB84-87A9-47FB-B3CB-55282536B006",
              "versionEndExcluding": "18.4.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AAB4DD-1C45-412F-84AA-C056A0BBFB9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F019975D-3A45-4522-9CB9-F4258C371DF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140AF13E-4463-478B-AA94-97406A80CB86",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1356861D-E6CA-4973-9597-629507E8C07E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI del software Cisco IOS XE SD-WAN independiente y del software Cisco SD-WAN podr\u00eda permitir a un atacante local autenticado eliminar archivos arbitrarios del sistema de archivos de un dispositivo afectado. Esta vulnerabilidad es debido a una insuficiente comprobaci\u00f3n de entradas. Un atacante podr\u00eda explotar esta vulnerabilidad al inyectar informaci\u00f3n de ruta de archivos arbitraria cuando son usados comandos en la CLI de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante eliminar archivos arbitrarios del sistema de archivos del dispositivo afectado"
    }
  ],
  "id": "CVE-2022-20850",
  "lastModified": "2024-11-21T06:43:41.000",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-30T19:15:12.543",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-1529

Vulnerability from fkie_nvd - Published: 2021-10-21 03:15 - Updated: 2024-11-21 05:44
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
Impacted products
Vendor Product Version
cisco ios_xe *
cisco ios_xe *
cisco ios_xe *
cisco ios_xe *
cisco ios_xe *
cisco ios_xe 17.6.0
cisco 1000_integrated_services_router -
cisco 1100-4g\/6g_integrated_services_router -
cisco 1100-4p_integrated_services_router -
cisco 1100-8p_integrated_services_router -
cisco 1100_integrated_services_router -
cisco 1101-4p_integrated_services_router -
cisco 1101_integrated_services_router -
cisco 1109-2p_integrated_services_router -
cisco 1109-4p_integrated_services_router -
cisco 1109_integrated_services_router -
cisco 1111x-8p_integrated_services_router -
cisco 1111x_integrated_services_router -
cisco 111x_integrated_services_router -
cisco 1120_integrated_services_router -
cisco 1160_integrated_services_router -
cisco 4000_integrated_services_router -
cisco 4221_integrated_services_router -
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco 4431_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco 4451_integrated_services_router -
cisco 4461_integrated_services_router -
cisco asr_1000 -
cisco asr_1000-esp100 -
cisco asr_1000-x -
cisco asr_1001 -
cisco asr_1001-hx -
cisco asr_1001-hx_r -
cisco asr_1001-x -
cisco asr_1001-x_r -
cisco asr_1002 -
cisco asr_1002-hx -
cisco asr_1002-hx_r -
cisco asr_1002-x -
cisco asr_1002-x_r -
cisco asr_1004 -
cisco asr_1006 -
cisco asr_1006-x -
cisco asr_1009-x -
cisco asr_1013 -
cisco asr_1023 -
cisco catalyst_8300-1n1s-4t2x -
cisco catalyst_8300-1n1s-6t -
cisco catalyst_8300-2n2s-4t2x -
cisco catalyst_8300-2n2s-6t -
cisco catalyst_8500 -
cisco catalyst_8500l -
cisco catalyst_8510csr -
cisco catalyst_8510msr -
cisco catalyst_8540csr -
cisco catalyst_8540msr -
cisco csr_1000v -
cisco ios_xe_sd-wan *
cisco 1100-4g\/6g_integrated_services_router -
cisco 1100-4p_integrated_services_router -
cisco 1100-8p_integrated_services_router -
cisco 1100_integrated_services_router -
cisco 1101-4p_integrated_services_router -
cisco 1101_integrated_services_router -
cisco 1109-2p_integrated_services_router -
cisco 1109-4p_integrated_services_router -
cisco 1109_integrated_services_router -
cisco 1111x-8p_integrated_services_router -
cisco 1111x_integrated_services_router -
cisco 111x_integrated_services_router -
cisco 1120_integrated_services_router -
cisco 1160_integrated_services_router -
cisco 4000_integrated_services_router -
cisco 4221_integrated_services_router -
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco 4431_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco 4451_integrated_services_router -
cisco 4461_integrated_services_router -
cisco asr_1000 -
cisco asr_1000-esp100 -
cisco asr_1000-x -
cisco asr_1001 -
cisco asr_1001-hx -
cisco asr_1001-hx_r -
cisco asr_1001-x -
cisco asr_1001-x_r -
cisco asr_1002 -
cisco asr_1002-hx -
cisco asr_1002-hx_r -
cisco asr_1002-x -
cisco asr_1002-x_r -
cisco asr_1002_fixed_router -
cisco asr_1004 -
cisco asr_1006 -
cisco asr_1006-x -
cisco asr_1009-x -
cisco asr_1013 -
cisco asr_1023 -
cisco catalyst_8300-1n1s-4t2x -
cisco catalyst_8300-1n1s-6t -
cisco catalyst_8300-2n2s-4t2x -
cisco catalyst_8300-2n2s-6t -
cisco catalyst_8500 -
cisco catalyst_8500l -
cisco catalyst_8510csr -
cisco catalyst_8510msr -
cisco catalyst_8540csr -
cisco catalyst_8540msr -
cisco csr_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D9FC0B-0178-4CDB-BF16-4F7639D0777F",
              "versionEndIncluding": "17.0",
              "versionStartIncluding": "16.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "192828BB-1A24-4ECB-8E8C-B65E73026C12",
              "versionEndExcluding": "17.2.3",
              "versionStartIncluding": "17.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7F46F8-B01B-4375-AACB-7DE1DBCB314E",
              "versionEndExcluding": "17.3.4",
              "versionStartIncluding": "17.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7C49DC-8719-4EF6-9B3C-7BDAB9CF7C4B",
              "versionEndExcluding": "17.4.2",
              "versionStartIncluding": "17.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E1FF0F-1AAE-45ED-9D82-0190423F3F4C",
              "versionEndExcluding": "17.5.1a",
              "versionStartIncluding": "17.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EBA153C-315C-4FCC-8F6B-4C6FDD95DF4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91209C16-A620-44A0-9134-8AA456343F29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2182E7-C813-4966-A36C-E648A9344299",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33208B25-0CBB-4E31-A892-60B7B5625155",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC03A84F-C8F2-4225-9A00-8FA35368CD57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F2A755-556C-4C5E-8622-96D124319AF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C81CC6E3-B989-4730-820E-46734E3E608D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7E8914-7B25-4097-8B22-6928C1F03D5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B207857B-C483-47DF-9FC7-6A05B866BF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04AB61E9-0148-495E-BD21-64D52DE60A6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D2C587-E95B-4E74-88CF-5930072258D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74270062-2030-45A0-9C93-C1F3B7C88E8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8B0B49-2C99-410B-B011-5B821C5992FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CCCA4D-3460-4327-A6D2-5F5AEA765400",
              "versionStartIncluding": "17.2.1r",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91209C16-A620-44A0-9134-8AA456343F29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2182E7-C813-4966-A36C-E648A9344299",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33208B25-0CBB-4E31-A892-60B7B5625155",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC03A84F-C8F2-4225-9A00-8FA35368CD57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F2A755-556C-4C5E-8622-96D124319AF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAE214D-8DD8-4DA3-872A-609E7CE6E606",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C81CC6E3-B989-4730-820E-46734E3E608D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7E8914-7B25-4097-8B22-6928C1F03D5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B207857B-C483-47DF-9FC7-6A05B866BF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04AB61E9-0148-495E-BD21-64D52DE60A6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D2C587-E95B-4E74-88CF-5930072258D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74270062-2030-45A0-9C93-C1F3B7C88E8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8B0B49-2C99-410B-B011-5B821C5992FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco IOS XE SD-WAN Software podr\u00eda permitir a un atacante local autenticado ejecutar comandos arbitrarios con privilegios de root. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de entradas por parte de la CLI del sistema. Un atacante podr\u00eda aprovechar esta vulnerabilidad al autenticarse en un dispositivo afectado y enviando entradas dise\u00f1adas a la CLI del sistema. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos en el sistema operativo subyacente con privilegios de root"
    }
  ],
  "id": "CVE-2021-1529",
  "lastModified": "2024-11-21T05:44:33.437",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-21T03:15:06.830",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34727

Vulnerability from fkie_nvd - Published: 2021-09-23 03:15 - Updated: 2024-11-21 06:11
Summary
A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. A successful exploit could allow the attacker to cause a buffer overflow and possibly execute arbitrary commands with root-level privileges, or cause the device to reload, which could result in a denial of service condition.
Impacted products
Vendor Product Version
cisco ios_xe_sd-wan -
cisco 1000_integrated_services_router -
cisco 1100-4g\/6g_integrated_services_router -
cisco 1100-4p_integrated_services_router -
cisco 1100-8p_integrated_services_router -
cisco 1100_integrated_services_router -
cisco 1101-4p_integrated_services_router -
cisco 1101_integrated_services_router -
cisco 1109-2p_integrated_services_router -
cisco 1109-4p_integrated_services_router -
cisco 1109_integrated_services_router -
cisco 1111x-8p_integrated_services_router -
cisco 1111x_integrated_services_router -
cisco 111x_integrated_services_router -
cisco 1120_integrated_services_router -
cisco 1160_integrated_services_router -
cisco 4000_integrated_services_router -
cisco 422_integrated_services_router -
cisco 4221_integrated_services_router -
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco 4431_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco 4451_integrated_services_router -
cisco 4461_integrated_services_router -
cisco asr_1000 -
cisco asr_1000-esp100 -
cisco asr_1000-x -
cisco asr_1000_series -
cisco asr_1000_series_route_processor_\(rp2\) -
cisco asr_1000_series_route_processor_\(rp3\) -
cisco asr_1001 -
cisco asr_1001-hx -
cisco asr_1001-hx_r -
cisco asr_1001-x -
cisco asr_1001-x_r -
cisco asr_1002 -
cisco asr_1002-hx -
cisco asr_1002-hx_r -
cisco asr_1002-x -
cisco asr_1002-x_r -
cisco asr_1004 -
cisco asr_1006 -
cisco asr_1006-x -
cisco asr_1009-x -
cisco asr_1013 -
cisco asr_1023 -
cisco csr_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16266B9E-E613-45FA-A02B-51EED8BEFCC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A273EE-41C1-41E9-9002-46F83FC6533F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91209C16-A620-44A0-9134-8AA456343F29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2182E7-C813-4966-A36C-E648A9344299",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B7C13F-46C5-460A-A6C9-3837A28A0CE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C02F9303-F9DF-4166-AB4B-8C26B9FAD109",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372CB4D6-BB22-4521-9C18-C0A663717168",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33208B25-0CBB-4E31-A892-60B7B5625155",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC03A84F-C8F2-4225-9A00-8FA35368CD57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F2A755-556C-4C5E-8622-96D124319AF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C81CC6E3-B989-4730-820E-46734E3E608D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8B0B49-2C99-410B-B011-5B821C5992FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. A successful exploit could allow the attacker to cause a buffer overflow and possibly execute arbitrary commands with root-level privileges, or cause the device to reload, which could result in a denial of service condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el proceso vDaemon de Cisco IOS XE SD-WAN Software podr\u00eda permitir a un atacante remoto no autenticado causar un desbordamiento del b\u00fafer en un dispositivo afectado. Esta vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de los l\u00edmites cuando un dispositivo afectado procesa el tr\u00e1fico. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de tr\u00e1fico dise\u00f1ado al dispositivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar un desbordamiento del b\u00fafer y posiblemente ejecutar comandos arbitrarios con privilegios de nivel de root, o causar la recarga del dispositivo, que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2021-34727",
  "lastModified": "2024-11-21T06:11:03.730",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-23T03:15:19.500",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-rbuffover-vE2OB6tp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-rbuffover-vE2OB6tp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34729

Vulnerability from fkie_nvd - Published: 2021-09-23 03:15 - Updated: 2024-11-21 06:11
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability.
Impacted products
Vendor Product Version
cisco ios_xe *
cisco ios_xe_sd-wan *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E2FB2F-309B-4974-B42B-13C1B0EC34BC",
              "versionEndIncluding": "17.3.1a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AD971B-2DB8-416D-B895-B1D0867C8F55",
              "versionEndIncluding": "17.3.1a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco IOS XE SD-WAN Software y de Cisco IOS XE Software podr\u00eda permitir a un atacante local autenticado ejecutar comandos arbitrarios con privilegios elevados en un dispositivo afectado. Esta vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de los argumentos que se pasan a determinados comandos de la CLI. Un atacante podr\u00eda explotar esta vulnerabilidad al incluir una entrada maliciosa en el argumento de un comando afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios elevados en el sistema operativo subyacente. Un atacante podr\u00eda necesitar credenciales de usuario v\u00e1lidas para explotar esta vulnerabilidad"
    }
  ],
  "id": "CVE-2021-34729",
  "lastModified": "2024-11-21T06:11:04.023",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-23T03:15:19.837",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34725

Vulnerability from fkie_nvd - Published: 2021-09-23 03:15 - Updated: 2024-11-21 06:11
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.
Impacted products
Vendor Product Version
cisco ios_xe_sd-wan *
cisco 1000_integrated_services_router -
cisco 1100-4g\/6g_integrated_services_router -
cisco 1100-4p_integrated_services_router -
cisco 1100-8p_integrated_services_router -
cisco 1100_integrated_services_router -
cisco 1101-4p_integrated_services_router -
cisco 1101_integrated_services_router -
cisco 1109-2p_integrated_services_router -
cisco 1109-4p_integrated_services_router -
cisco 1109_integrated_services_router -
cisco 1111x-8p_integrated_services_router -
cisco 1111x_integrated_services_router -
cisco 111x_integrated_services_router -
cisco 1120_integrated_services_router -
cisco 1160_integrated_services_router -
cisco 4000_integrated_services_router -
cisco 422_integrated_services_router -
cisco 4221_integrated_services_router -
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco 4431_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco 4451_integrated_services_router -
cisco 4461_integrated_services_router -
cisco asr_1000 -
cisco asr_1000-esp100 -
cisco asr_1000-x -
cisco asr_1000_series -
cisco asr_1000_series_route_processor_\(rp2\) -
cisco asr_1000_series_route_processor_\(rp3\) -
cisco asr_1001 -
cisco asr_1001-hx -
cisco asr_1001-hx_r -
cisco asr_1001-x -
cisco asr_1001-x_r -
cisco asr_1002 -
cisco asr_1002-hx -
cisco asr_1002-hx_r -
cisco asr_1002-x -
cisco asr_1002-x_r -
cisco asr_1004 -
cisco asr_1006 -
cisco asr_1006-x -
cisco asr_1009-x -
cisco asr_1013 -
cisco asr_1023 -
cisco csr_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2108544A-5C67-483F-926E-0830CC7808FA",
              "versionEndIncluding": "17.2.1r",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A273EE-41C1-41E9-9002-46F83FC6533F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91209C16-A620-44A0-9134-8AA456343F29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2182E7-C813-4966-A36C-E648A9344299",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B7C13F-46C5-460A-A6C9-3837A28A0CE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C02F9303-F9DF-4166-AB4B-8C26B9FAD109",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372CB4D6-BB22-4521-9C18-C0A663717168",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33208B25-0CBB-4E31-A892-60B7B5625155",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC03A84F-C8F2-4225-9A00-8FA35368CD57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F2A755-556C-4C5E-8622-96D124319AF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C81CC6E3-B989-4730-820E-46734E3E608D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8B0B49-2C99-410B-B011-5B821C5992FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco IOS XE SD-WAN Software podr\u00eda permitir a un atacante local autenticado inyectar comandos arbitrarios para ejecutarlos con privilegios de nivel de root en el sistema operativo subyacente. Esta vulnerabilidad es debido a una insuficiente comprobaci\u00f3n de entrada en determinados comandos de la CLI. Un atacante podr\u00eda explotar esta vulnerabilidad al autenticarse en un dispositivo afectado y enviando entradas dise\u00f1adas a la CLI. El atacante debe estar autenticado como usuario administrativo para ejecutar los comandos afectados. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos con privilegios de nivel de root"
    }
  ],
  "id": "CVE-2021-34725",
  "lastModified": "2024-11-21T06:11:03.450",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-23T03:15:19.093",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-privesc-KSUg7QSS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-privesc-KSUg7QSS"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34724

Vulnerability from fkie_nvd - Published: 2021-09-23 03:15 - Updated: 2024-11-21 06:11
Summary
A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device.
Impacted products
Vendor Product Version
cisco ios_xe_sd-wan *
cisco 1000_integrated_services_router -
cisco 1100-4g\/6g_integrated_services_router -
cisco 1100-4p_integrated_services_router -
cisco 1100-8p_integrated_services_router -
cisco 1100_integrated_services_router -
cisco 1101-4p_integrated_services_router -
cisco 1101_integrated_services_router -
cisco 1109-2p_integrated_services_router -
cisco 1109-4p_integrated_services_router -
cisco 1109_integrated_services_router -
cisco 1111x-8p_integrated_services_router -
cisco 1111x_integrated_services_router -
cisco 111x_integrated_services_router -
cisco 1120_integrated_services_router -
cisco 1160_integrated_services_router -
cisco 4000_integrated_services_router -
cisco 422_integrated_services_router -
cisco 4221_integrated_services_router -
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco 4431_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco 4451_integrated_services_router -
cisco 4461_integrated_services_router -
cisco asr_1000 -
cisco asr_1000-esp100 -
cisco asr_1000-x -
cisco asr_1000_series -
cisco asr_1000_series_route_processor_\(rp2\) -
cisco asr_1000_series_route_processor_\(rp3\) -
cisco asr_1001 -
cisco asr_1001-hx -
cisco asr_1001-hx_r -
cisco asr_1001-x -
cisco asr_1001-x_r -
cisco asr_1002 -
cisco asr_1002-hx -
cisco asr_1002-hx_r -
cisco asr_1002-x -
cisco asr_1002-x_r -
cisco asr_1004 -
cisco asr_1006 -
cisco asr_1006-x -
cisco asr_1009-x -
cisco asr_1013 -
cisco asr_1023 -
cisco csr_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AD971B-2DB8-416D-B895-B1D0867C8F55",
              "versionEndIncluding": "17.3.1a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A273EE-41C1-41E9-9002-46F83FC6533F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91209C16-A620-44A0-9134-8AA456343F29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2182E7-C813-4966-A36C-E648A9344299",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B7C13F-46C5-460A-A6C9-3837A28A0CE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C02F9303-F9DF-4166-AB4B-8C26B9FAD109",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372CB4D6-BB22-4521-9C18-C0A663717168",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33208B25-0CBB-4E31-A892-60B7B5625155",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC03A84F-C8F2-4225-9A00-8FA35368CD57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F2A755-556C-4C5E-8622-96D124319AF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C81CC6E3-B989-4730-820E-46734E3E608D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8B0B49-2C99-410B-B011-5B821C5992FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco IOS XE SD-WAN Software podr\u00eda permitir a un atacante local autenticado elevar los privilegios y ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario root. Un atacante debe estar autenticado en un dispositivo afectado como usuario PRIV15. Esta vulnerabilidad es debido a una protecci\u00f3n insuficiente del sistema de archivos y a la presencia de un archivo confidencial en el directorio bootflash de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al sobrescribir un archivo de instalaci\u00f3n almacenado en el directorio bootflash con comandos arbitrarios que pueden ser ejecutados con privilegios de nivel root. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante leer y escribir cambios en la base de datos de configuraci\u00f3n del dispositivo afectado"
    }
  ],
  "id": "CVE-2021-34724",
  "lastModified": "2024-11-21T06:11:03.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-23T03:15:18.813",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-privesc-VP4FG3jD"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-privesc-VP4FG3jD"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-1619

Vulnerability from fkie_nvd - Published: 2021-09-23 03:15 - Updated: 2024-11-21 05:44
Summary
A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS.
Impacted products
Vendor Product Version
cisco ios_xe 16.3.1
cisco ios_xe 16.3.1a
cisco ios_xe 16.3.2
cisco ios_xe 16.3.3
cisco ios_xe 16.3.4
cisco ios_xe 16.3.5
cisco ios_xe 16.3.5b
cisco ios_xe 16.3.6
cisco ios_xe 16.3.7
cisco ios_xe 16.3.8
cisco ios_xe 16.3.9
cisco ios_xe 16.3.10
cisco ios_xe 16.3.11
cisco ios_xe 16.4.1
cisco ios_xe 16.4.2
cisco ios_xe 16.4.3
cisco ios_xe 16.5.1
cisco ios_xe 16.5.1a
cisco ios_xe 16.5.1b
cisco ios_xe 16.5.2
cisco ios_xe 16.5.3
cisco ios_xe 16.6.1
cisco ios_xe 16.6.2
cisco ios_xe 16.6.3
cisco ios_xe 16.6.4
cisco ios_xe 16.6.4a
cisco ios_xe 16.6.4s
cisco ios_xe 16.6.5
cisco ios_xe 16.6.5a
cisco ios_xe 16.6.5b
cisco ios_xe 16.6.6
cisco ios_xe 16.6.7
cisco ios_xe 16.6.7a
cisco ios_xe 16.6.8
cisco ios_xe 16.6.9
cisco ios_xe 16.7.1
cisco ios_xe 16.7.1a
cisco ios_xe 16.7.1b
cisco ios_xe 16.7.2
cisco ios_xe 16.7.3
cisco ios_xe 16.7.4
cisco ios_xe 16.8.1
cisco ios_xe 16.8.1a
cisco ios_xe 16.8.1b
cisco ios_xe 16.8.1c
cisco ios_xe 16.8.1d
cisco ios_xe 16.8.1e
cisco ios_xe 16.8.1s
cisco ios_xe 16.8.2
cisco ios_xe 16.8.3
cisco ios_xe 16.9.1
cisco ios_xe 16.9.1a
cisco ios_xe 16.9.1b
cisco ios_xe 16.9.1c
cisco ios_xe 16.9.1d
cisco ios_xe 16.9.1s
cisco ios_xe 16.9.2
cisco ios_xe 16.9.2a
cisco ios_xe 16.9.2s
cisco ios_xe 16.9.3
cisco ios_xe 16.9.3a
cisco ios_xe 16.9.3h
cisco ios_xe 16.9.3s
cisco ios_xe 16.9.4
cisco ios_xe 16.9.4c
cisco ios_xe 16.9.5
cisco ios_xe 16.9.5f
cisco ios_xe 16.9.6
cisco ios_xe 16.9.7
cisco ios_xe 16.10.1
cisco ios_xe 16.10.1a
cisco ios_xe 16.10.1b
cisco ios_xe 16.10.1c
cisco ios_xe 16.10.1d
cisco ios_xe 16.10.1e
cisco ios_xe 16.10.1f
cisco ios_xe 16.10.1g
cisco ios_xe 16.10.1s
cisco ios_xe 16.10.2
cisco ios_xe 16.10.3
cisco ios_xe 16.11.1
cisco ios_xe 16.11.1a
cisco ios_xe 16.11.1b
cisco ios_xe 16.11.1c
cisco ios_xe 16.11.1s
cisco ios_xe 16.11.2
cisco ios_xe 16.12.1
cisco ios_xe 16.12.1a
cisco ios_xe 16.12.1c
cisco ios_xe 16.12.1s
cisco ios_xe 16.12.1t
cisco ios_xe 16.12.1w
cisco ios_xe 16.12.1x
cisco ios_xe 16.12.1y
cisco ios_xe 16.12.1z
cisco ios_xe 16.12.1z1
cisco ios_xe 16.12.1za
cisco ios_xe 16.12.2
cisco ios_xe 16.12.2a
cisco ios_xe 16.12.2s
cisco ios_xe 16.12.2t
cisco ios_xe 16.12.3
cisco ios_xe 16.12.3a
cisco ios_xe 16.12.3s
cisco ios_xe 16.12.4
cisco ios_xe 16.12.4a
cisco ios_xe 16.12.5
cisco ios_xe 16.12.5a
cisco ios_xe 16.12.5b
cisco ios_xe 17.1.1
cisco ios_xe 17.1.1a
cisco ios_xe 17.1.1s
cisco ios_xe 17.1.1t
cisco ios_xe 17.1.2
cisco ios_xe 17.1.3
cisco ios_xe 17.2.1
cisco ios_xe 17.2.1a
cisco ios_xe 17.2.1r
cisco ios_xe 17.2.1v
cisco ios_xe_sd-wan *
cisco ios_xe_sd-wan_16.10.1_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.1_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.1_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.1_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.2_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.2_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.2_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.2_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.3_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.3_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.3_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.3_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.3a_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.3a_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.3a_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.3a_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.10.3a_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.3b_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.3b_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.3b_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.3b_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.10.3b_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.4_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.4_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.4_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.4_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.10.4_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.5_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.5_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.5_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.5_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.10.5_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.10.6_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.6_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.10.6_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.10.6_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.10.6_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.11.1_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.11.1_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.11.1a_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1a_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1a_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.11.1a_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.11.1a_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.11.1b_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1b_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1b_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.11.1b_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.11.1b_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.11.1d_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.11.1d_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.11.1f_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1s_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1s_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.11.1s_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.11.1s_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.11.1s_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1a_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1a_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1a_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1a_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1a_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1a_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1b_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1b_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1b_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1b_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1b_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1b_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1b1_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1b1_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1b1_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1b1_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1b1_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1b1_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1c_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1c_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1c_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1c_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1c_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1c_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1d_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1d_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1d_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1d_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1d_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1d_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.1e_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1e_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.1e_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.1e_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.1e_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.1e_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.2r_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.2r_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.2r_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.2r_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.2r_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.2r_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.3_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.3_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.3_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.3_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.3_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.3_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.4_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.4_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.4_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.4_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.4_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.4_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.4a_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.4a_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.4a_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.12.5_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.5_when_installed_on_1100_series_industrial_integrated_services routers
cisco ios_xe_sd-wan_16.12.5_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.12.5_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.12.5_when_installed_on_cloud_services_router_1000v series
cisco ios_xe_sd-wan_16.12.5_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.9.1_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.1_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.1_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.9.1_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.9.2_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.2_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.2_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.9.2_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.9.3_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.3_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.3_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.9.3_when_installed_on_integrated_services_virtual router
cisco ios_xe_sd-wan_16.9.4_when_installed_on_1000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.4_when_installed_on_4000_series_integrated_services routers
cisco ios_xe_sd-wan_16.9.4_when_installed_on_asr_1000_series_aggregation_services routers
cisco ios_xe_sd-wan_16.9.4_when_installed_on_integrated_services_virtual router

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B688E46-5BAD-4DEC-8B13-B184B141B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A6CF7-9104-4882-9C95-E6D4458AB778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
              "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FC3CC1-CF4F-4A2D-A500-04395AFE8B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*",
              "matchCriteriaId": "027200FC-8AD4-47E4-A404-490AE4F997EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89369318-2E83-489F-B872-5F2E247BBF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
              "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C87891C-B8D0-4286-B6A7-61037E1A6A54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.1_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A0A536-ADF8-44D3-B960-767025DED25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.1_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3B1F5A-5987-4720-94F5-614EB02639DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.1_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "D06B3980-ACB0-48B1-9801-754551213C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.1_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEEE351E-EE71-46C7-B6DA-62D54698AFB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.2_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "A340C7D4-71FC-4E41-80BA-AC683E3D5F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.2_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24003FB-0DC6-4449-8922-F4ACA80296C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.2_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB4A03C-8BCF-4660-9DA9-FE807E2AB9AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.2_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE682DA-5B06-4A27-9A12-312668B78118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6CA4F-5E4C-4F4B-AD6C-E4A12784B1D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F3285F-2EE4-49C9-B5F7-EC725552AFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCFFAEFE-C620-4F68-A681-DB9F493A3AA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FBED6-625C-4423-BD3A-486F262DE865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3a_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFBD5FBB-27C6-4299-A46B-853D94F88795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3a_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AC53DA-1564-4EEB-A4E2-AE76E372BB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3a_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "58968DAC-01A0-4845-B053-20C5573B892C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3a_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "D35E9FD8-ADC1-4284-B393-E45F97C281E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3a_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F270440-7310-4FE0-8891-CA4B82EBE88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3b_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FC35326-C3E4-4E4C-9F9B-601F1FEE43DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3b_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CD21F57-0588-4E67-A95C-ADECCB9EA659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3b_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2D3822-BD61-4909-B0F3-13A4A9C6A5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3b_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB084FD4-A65E-4586-B467-F9DE9C1F7888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.3b_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC2FEB6-A721-4695-8E6D-229BDCC3C40C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.4_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB6F6B9-8D54-49E3-B1C9-B5E841F7106A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.4_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3168349-D399-44EC-8CD0-C99393C2ACD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.4_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CAA12B-31A8-466C-9A05-F89948546E4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.4_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "B383C185-0FDB-4ED5-9E00-78844E9D62B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.4_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCF3363-780C-49D9-AC78-65E150B7B28D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.5_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA8CAA1-0578-41E5-BA14-55B543AA1A7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.5_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "B450CE67-F447-48F7-9909-7F6871A01296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.5_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A764D0-8FD7-4385-B3C3-175B9FA2CFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.5_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EC19E2-546C-47C6-B436-A0040FCD501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.5_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "45BA16BC-6B8C-4054-85D6-46C4475DEE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.6_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5272305-0AAA-4EE0-9C1C-6B81DF937D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.6_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA4951E-F81E-4047-B07D-939F42A40305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.6_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3E1D135-E386-41B0-A258-A33D8CE4718E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.6_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD0C0C-F21E-4CA9-BD1E-4D15CEC2851A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.10.6_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D71B2C6-86C5-47D3-8FA3-CF92A0114AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "E32E05A7-1BAE-4643-9551-43BC1FF6F526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "688E39CF-BAAB-4FD4-9D78-A503B5612F45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "8328924E-A5FB-46A3-ABD9-7EBEF8CA2C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "84C3CFDE-DEF7-4394-9EE1-A523F141FB79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1a_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "8490BFFF-1742-40B0-9C18-472A0BA7B983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1a_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C76978A-41FB-455C-8A24-05B8C3DAB53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1a_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "48474738-D136-4ACB-B7DF-450BA6083374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1a_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD4F063A-7729-4472-B97F-C3EF79046D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1a_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB2BB4F-7F85-4B35-A436-B217A5F3FCEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1b_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB206A40-E896-4C34-A5C9-BEA86B4AB517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1b_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC2A035D-86BC-49D6-ACCD-12C99949C15E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1b_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "21ADF517-239B-4752-B3CA-F8F98A0E25A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1b_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "7089E027-B0B7-40F2-AEF6-9C92EA81C182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1b_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "299AF83F-06EA-40C2-92B1-4AADF1598E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1d_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EAB53F-36AA-4E18-993D-F11BB7BD1FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1d_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "24103DA4-4D1A-47B9-94E1-057B763814EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1f_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8EB0640-BD2A-40FB-B484-52B6935E8D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1s_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "231A4EF5-622F-42E3-A076-D75C2386E070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1s_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCE172B-5C5C-4218-B846-32F0A3A7A6AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1s_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "3255DA5F-EE39-485C-8E34-55770DBCA2BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1s_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CAD9DC-3E5F-41D9-BE4E-24F556B1BCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.11.1s_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E986F02-DA6A-4BF0-93D8-71273BC4F425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF3B14C-6974-47F6-8E1D-40B2B8DC361E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA17E43C-3C8F-465D-AC52-A7A1819F4797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92E7447-C4DE-406F-9103-4DA1AE904393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "1258FA0D-3BA4-4ED3-80F7-6AFC0073B0EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C963528-9605-45D3-8973-C65E9D63F5BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "134FCF9D-ABF6-4C91-B9E2-3DCCD10AEBAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1a_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "512BD2EF-6DA8-4454-9734-224878AC90ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1a_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18FE714-3187-4CCE-88E7-66E0237ECBF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1a_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1ED3B2-FA30-44E7-9FED-1CA7E22831F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1a_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F816C5B-E372-4D5D-8BEE-C3DFE5305AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1a_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B31F0-6EE8-4DAB-806F-92718E88A3D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1a_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3C66EA7-B772-4E93-9FAC-EDA0433EC912",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C72BAC5-0CD2-48C3-A8C8-3845348B8636",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "564A4CE1-3792-4A32-A16A-C9E241F37D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B5E9188-5618-4EBB-A3D5-FEEE22F6151F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C40AAE1-8709-4D10-8B04-825365B5B8EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF58AEB0-3880-4D24-9412-57CA5BA4709A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D43CCF-EC56-4444-9554-A944B22671F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b1_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C641DC-C67F-4E92-8BF7-9520F2AE703E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b1_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E978D12-B0DD-4D19-BB0E-14CC51E8CDD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b1_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BA5B12-ED6C-41EE-8AAB-B429873D8C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b1_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "573CA620-8518-4228-982B-1CF51D381344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b1_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB1EE90-408D-4F85-8574-E3D93C911CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1b1_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF002832-906F-4AA9-88A3-7CA6DBDE5BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1c_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFB47F7-E07C-4C16-8158-F8A46DFCEC5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1c_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56E716C-3F3C-46FC-AD7D-25778F2B1111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1c_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE6D69E-B03F-4A6D-B107-74318C1CD9BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1c_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "31DB0C98-03DC-4C3E-98BE-18F7C6B059D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1c_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A9B3FE-7930-478A-982C-3CF6E75681CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1c_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "806C92F4-D85F-41F6-8494-775327A1787D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1d_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755EE89-25E7-4C38-A263-6FFFE6CEAE85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1d_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8D35E-D0B6-4FBB-83E8-055C34C7A0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1d_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0921424-A543-4725-8770-5952DDF9F536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1d_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D07EA68-77EE-40AE-9629-E3F84144D57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1d_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF56A81-858B-490A-8B58-7FF1CC61FE27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1d_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "4783CD8A-85FC-4D4D-9712-FDC49B8FE81F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1e_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875BC4D-072D-442D-92B3-7B096C018630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1e_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BABFAA-8FD3-413F-BB90-9645BAF7FB71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1e_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFAE70A-9216-4DA6-8A73-5A8B77D464AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1e_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "00183E7A-23A2-44D9-ABCF-133994ED45A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1e_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F635F6-D364-4CFA-B6A5-CE1532B42D1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.1e_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BCED55C-4BFA-43B8-A1AF-6A86E4642CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.2r_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "30634B93-ACAD-48ED-81F9-D89C4912469E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.2r_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "861F089E-C995-42EE-BAE2-B3A61F6B8DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.2r_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "06041916-F44E-408C-BD9B-8B1A3BD4FB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.2r_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD0BAAB5-E84C-4EF2-972D-F46759861B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.2r_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C186C0-9F14-4466-ADA3-49901C39A2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.2r_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E24D-4AC2-4D13-BFFC-D93BAE170B12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.3_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "281C0EE0-FBFF-4338-A053-1DE61BBE0427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.3_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "527F2C7D-3412-4AC4-A412-568E99CB0E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.3_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9838B0B-0A1D-44FC-8959-98B10A06A194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.3_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDCDA4F-DB99-4CA1-BF4F-E5A1FE1D5471",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.3_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "F469FCCF-0434-4D36-846A-FC9A64790CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.3_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50B778D-BD8B-4B27-B13B-187BC378FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F5DDBD-6562-4A84-A7D9-F0ECFB0C4411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "22481518-1EC9-409C-B0CD-ECC3583413FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3B01647-CB45-4DAE-A230-C393DC9DF2CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "82454FE7-4252-489E-A643-962DA3C3E463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D44A99-C451-4617-91D9-E0B4E32A1A84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DECD9E8-6103-4F4A-904F-22CBDA739DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4a_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AA7D5A7-718F-4DC2-A1E9-01DB7FFDCE88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4a_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0F3E050-2F5A-4435-B7C2-5C71A97A8828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.4a_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C24472-7F1C-404D-8DFE-53E3AB95DCC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.5_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "89EA170E-E67C-4660-B05D-A22F36B74F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.5_when_installed_on_1100_series_industrial_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D8D57E-A22C-40BF-9A9A-A702CE4BE12C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.5_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "4567E8AA-676C-4E61-96A3-F17ECD809463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.5_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "B038FCEA-DCDA-427F-BD46-65D2FDCF2F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.5_when_installed_on_cloud_services_router_1000v:series:*:*:*:*:*:*:*",
              "matchCriteriaId": "C271A6EA-3A07-462F-8124-394CD5BC9377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.12.5_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F70E91-B076-46DB-9EDF-D7E16B854D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.1_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B1FEC7-AD20-4373-A1D6-092864E62106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.1_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0F75E5-5802-4C35-A598-B931C4E90AFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.1_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05DF850-E8E3-4207-BE35-C903AB0126BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.1_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A143FF-4E58-4AFC-A199-98B209EBDFF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.2_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6E3EDD0-7182-4DEA-9B57-0302CBD3B810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.2_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2FC243-0D09-48AF-B872-BE6078E15378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.2_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5BD205A-E538-48B1-9A5D-614746F44F05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.2_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "27BA01C6-3AA5-4D2F-97D3-1F403476C2C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.3_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00B4214-3C2A-4B5C-8106-C4AC208FBCC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.3_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "F699BC28-F47F-44EF-A0CB-E3FFC96F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.3_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "09320600-0879-4F99-88F7-F68860BE4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.3_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE26743C-185F-4FFF-B676-F2A14E4984E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.4_when_installed_on_1000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "120ED9DC-38C4-4F9F-8F02-44A78C5C6AC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.4_when_installed_on_4000_series_integrated_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "E58A56B2-197D-4C28-BD42-41F13BC5C374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.4_when_installed_on_asr_1000_series_aggregation_services:routers:*:*:*:*:*:*:*",
              "matchCriteriaId": "489106B9-7E60-42E8-9CDB-8F8B9E68F016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe_sd-wan_16.9.4_when_installed_on_integrated_services_virtual:router:*:*:*:*:*:*:*",
              "matchCriteriaId": "05C74460-5A8C-47B9-8AC7-124E17B3DE7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la funci\u00f3n de autenticaci\u00f3n, autorizaci\u00f3n y contabilidad (AAA) de Cisco IOS XE Software podr\u00eda permitir a un atacante remoto no autenticado omitir la autenticaci\u00f3n NETCONF o RESTCONF y realizar cualquiera de las siguientes acciones Instalar, manipular o eliminar la configuraci\u00f3n de un dispositivo afectado. Causar una corrupci\u00f3n de la memoria que resulte en una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a una variable no inicializada. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una serie de peticiones NETCONF o RESTCONF a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante usar NETCONF o RESTCONF para instalar, manipular o borrar la configuraci\u00f3n de un dispositivo de red o corromper la memoria del dispositivo, resultando un DoS"
    }
  ],
  "id": "CVE-2021-1619",
  "lastModified": "2024-11-21T05:44:45.213",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-23T03:15:12.820",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-824"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-908"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2025-20352 (GCVE-0-2025-20352)

Vulnerability from cvelistv5 – Published: 2025-09-24 17:10 – Updated: 2025-10-21 22:45
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. Note: This vulnerability affects all versions of SNMP.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Cisco IOS Affected: 12.2(55)SE
Affected: 12.2(55)SE3
Affected: 12.2(55)SE2
Affected: 12.2(58)SE
Affected: 12.2(55)SE1
Affected: 12.2(58)SE1
Affected: 12.2(55)SE4
Affected: 12.2(58)SE2
Affected: 12.2(55)SE5
Affected: 12.2(55)SE6
Affected: 12.2(55)SE7
Affected: 12.2(55)SE8
Affected: 12.2(55)SE9
Affected: 12.2(55)SE10
Affected: 12.2(55)SE11
Affected: 12.2(55)SE12
Affected: 12.2(55)SE13
Affected: 12.2(58)EZ
Affected: 12.2(53)EZ
Affected: 12.2(55)EZ
Affected: 12.2(60)EZ
Affected: 12.2(60)EZ1
Affected: 12.2(60)EZ2
Affected: 12.2(60)EZ3
Affected: 12.2(60)EZ4
Affected: 12.2(60)EZ5
Affected: 12.2(60)EZ6
Affected: 12.2(60)EZ7
Affected: 12.2(60)EZ8
Affected: 12.2(60)EZ9
Affected: 12.2(60)EZ10
Affected: 12.2(60)EZ11
Affected: 12.2(60)EZ12
Affected: 12.2(60)EZ13
Affected: 12.2(60)EZ14
Affected: 12.2(60)EZ15
Affected: 12.2(33)SXI2
Affected: 12.2(33)SXI3
Affected: 12.2(33)SXI5
Affected: 12.2(33)SXI4a
Affected: 12.2(33)SXI4
Affected: 12.2(33)SXI2a
Affected: 12.2(33)SXI
Affected: 12.2(33)SXI6
Affected: 12.2(33)SXI7
Affected: 12.2(33)SXI1
Affected: 12.2(33)SXI8
Affected: 12.2(33)SXI9
Affected: 12.2(33)SXI8a
Affected: 12.2(33)SXI10
Affected: 12.2(33)SXI11
Affected: 12.2(33)SXI12
Affected: 12.2(33)SXI13
Affected: 12.2(33)SXI14
Affected: 12.2(50)SQ2
Affected: 12.2(50)SQ1
Affected: 12.2(50)SQ
Affected: 12.2(50)SQ3
Affected: 12.2(50)SQ4
Affected: 12.2(50)SQ5
Affected: 12.2(50)SQ6
Affected: 12.2(50)SQ7
Affected: 15.3(1)T
Affected: 15.3(2)T
Affected: 15.3(1)T1
Affected: 15.3(1)T2
Affected: 15.3(1)T3
Affected: 15.3(1)T4
Affected: 15.3(2)T1
Affected: 15.3(2)T2
Affected: 15.3(2)T3
Affected: 15.3(2)T4
Affected: 15.0(1)EY
Affected: 15.0(1)EY1
Affected: 15.0(1)EY2
Affected: 15.0(2)EY
Affected: 15.0(2)EY1
Affected: 15.0(2)EY2
Affected: 15.0(2)EY3
Affected: 15.0(1)SE
Affected: 15.0(2)SE
Affected: 15.0(1)SE1
Affected: 15.0(1)SE2
Affected: 15.0(1)SE3
Affected: 15.0(2)SE1
Affected: 15.0(2)SE2
Affected: 15.0(2)SE3
Affected: 15.0(2)SE4
Affected: 15.0(2)SE5
Affected: 15.0(2)SE6
Affected: 15.0(2)SE7
Affected: 15.0(2)SE8
Affected: 15.0(2)SE9
Affected: 15.0(2)SE10
Affected: 15.0(2)SE11
Affected: 15.0(2)SE10a
Affected: 15.0(2)SE12
Affected: 15.0(2)SE13
Affected: 15.0(1)SY
Affected: 15.0(1)SY1
Affected: 15.0(1)SY2
Affected: 15.0(1)SY3
Affected: 15.0(1)SY4
Affected: 15.0(1)SY5
Affected: 15.0(1)SY6
Affected: 15.0(1)SY7
Affected: 15.0(1)SY8
Affected: 15.0(1)SY7a
Affected: 15.0(1)SY9
Affected: 15.0(1)SY10
Affected: 12.2(33)SXJ
Affected: 12.2(33)SXJ1
Affected: 12.2(33)SXJ2
Affected: 12.2(33)SXJ3
Affected: 12.2(33)SXJ4
Affected: 12.2(33)SXJ5
Affected: 12.2(33)SXJ6
Affected: 12.2(33)SXJ7
Affected: 12.2(33)SXJ8
Affected: 12.2(33)SXJ9
Affected: 12.2(33)SXJ10
Affected: 15.1(1)SG
Affected: 15.1(2)SG
Affected: 15.1(1)SG1
Affected: 15.1(1)SG2
Affected: 15.1(2)SG1
Affected: 15.1(2)SG2
Affected: 15.1(2)SG3
Affected: 15.1(2)SG4
Affected: 15.1(2)SG5
Affected: 15.1(2)SG6
Affected: 15.1(2)SG7
Affected: 15.1(2)SG8
Affected: 15.2(4)M
Affected: 15.2(4)M1
Affected: 15.2(4)M2
Affected: 15.2(4)M4
Affected: 15.2(4)M3
Affected: 15.2(4)M5
Affected: 15.2(4)M8
Affected: 15.2(4)M10
Affected: 15.2(4)M7
Affected: 15.2(4)M6
Affected: 15.2(4)M9
Affected: 15.2(4)M6a
Affected: 15.2(4)M11
Affected: 15.0(2)SG
Affected: 15.0(2)SG1
Affected: 15.0(2)SG2
Affected: 15.0(2)SG3
Affected: 15.0(2)SG4
Affected: 15.0(2)SG5
Affected: 15.0(2)SG6
Affected: 15.0(2)SG7
Affected: 15.0(2)SG8
Affected: 15.0(2)SG9
Affected: 15.0(2)SG10
Affected: 15.0(2)SG11
Affected: 15.2(2)GC
Affected: 15.2(3)GC
Affected: 15.2(3)GC1
Affected: 15.2(4)GC
Affected: 15.2(4)GC1
Affected: 15.2(4)GC2
Affected: 15.2(4)GC3
Affected: 15.1(1)SY
Affected: 15.1(1)SY1
Affected: 15.1(2)SY
Affected: 15.1(2)SY1
Affected: 15.1(2)SY2
Affected: 15.1(1)SY2
Affected: 15.1(1)SY3
Affected: 15.1(2)SY3
Affected: 15.1(1)SY4
Affected: 15.1(2)SY4
Affected: 15.1(1)SY5
Affected: 15.1(2)SY5
Affected: 15.1(2)SY4a
Affected: 15.1(1)SY6
Affected: 15.1(2)SY6
Affected: 15.1(2)SY7
Affected: 15.1(2)SY8
Affected: 15.1(2)SY9
Affected: 15.1(2)SY10
Affected: 15.1(2)SY11
Affected: 15.1(2)SY12
Affected: 15.1(2)SY13
Affected: 15.1(2)SY14
Affected: 15.1(2)SY15
Affected: 15.1(2)SY16
Affected: 15.4(1)T
Affected: 15.4(2)T
Affected: 15.4(1)T2
Affected: 15.4(1)T1
Affected: 15.4(1)T3
Affected: 15.4(2)T1
Affected: 15.4(2)T3
Affected: 15.4(2)T2
Affected: 15.4(1)T4
Affected: 15.4(2)T4
Affected: 15.0(2)EA
Affected: 15.0(2)EA1
Affected: 15.2(1)E
Affected: 15.2(2)E
Affected: 15.2(1)E1
Affected: 15.2(3)E
Affected: 15.2(1)E2
Affected: 15.2(1)E3
Affected: 15.2(2)E1
Affected: 15.2(4)E
Affected: 15.2(3)E1
Affected: 15.2(2)E2
Affected: 15.2(2a)E1
Affected: 15.2(2)E3
Affected: 15.2(2a)E2
Affected: 15.2(3)E2
Affected: 15.2(3a)E
Affected: 15.2(3)E3
Affected: 15.2(4)E1
Affected: 15.2(2)E4
Affected: 15.2(2)E5
Affected: 15.2(4)E2
Affected: 15.2(3)E4
Affected: 15.2(5)E
Affected: 15.2(4)E3
Affected: 15.2(2)E6
Affected: 15.2(5a)E
Affected: 15.2(5)E1
Affected: 15.2(5b)E
Affected: 15.2(2)E5a
Affected: 15.2(5c)E
Affected: 15.2(2)E5b
Affected: 15.2(5a)E1
Affected: 15.2(4)E4
Affected: 15.2(2)E7
Affected: 15.2(5)E2
Affected: 15.2(6)E
Affected: 15.2(4)E5
Affected: 15.2(5)E2c
Affected: 15.2(2)E8
Affected: 15.2(6)E0a
Affected: 15.2(6)E1
Affected: 15.2(6)E0c
Affected: 15.2(4)E6
Affected: 15.2(6)E2
Affected: 15.2(2)E9
Affected: 15.2(4)E7
Affected: 15.2(7)E
Affected: 15.2(2)E10
Affected: 15.2(4)E8
Affected: 15.2(6)E2a
Affected: 15.2(6)E2b
Affected: 15.2(7)E1
Affected: 15.2(7)E0a
Affected: 15.2(7)E0b
Affected: 15.2(7)E0s
Affected: 15.2(6)E3
Affected: 15.2(4)E9
Affected: 15.2(7)E2
Affected: 15.2(7a)E0b
Affected: 15.2(4)E10
Affected: 15.2(7)E3
Affected: 15.2(7)E1a
Affected: 15.2(7b)E0b
Affected: 15.2(7)E2a
Affected: 15.2(4)E10a
Affected: 15.2(7)E4
Affected: 15.2(7)E3k
Affected: 15.2(8)E
Affected: 15.2(8)E1
Affected: 15.2(7)E5
Affected: 15.2(7)E6
Affected: 15.2(8)E2
Affected: 15.2(4)E10d
Affected: 15.2(7)E7
Affected: 15.2(8)E3
Affected: 15.2(7)E8
Affected: 15.2(8)E4
Affected: 15.2(7)E9
Affected: 15.2(8)E5
Affected: 15.2(8)E6
Affected: 15.2(7)E10
Affected: 15.2(7)E11
Affected: 15.2(8)E7
Affected: 15.2(7)E12
Affected: 15.2(2)JB
Affected: 15.2(2)JB2
Affected: 15.2(4)JB
Affected: 15.2(2)JB3
Affected: 15.2(4)JB1
Affected: 15.2(4)JB2
Affected: 15.2(4)JB3
Affected: 15.2(4)JB3a
Affected: 15.2(2)JB4
Affected: 15.2(4)JB4
Affected: 15.2(4)JB3h
Affected: 15.2(4)JB3b
Affected: 15.2(4)JB5
Affected: 15.2(4)JB6
Affected: 15.2(2)JB5
Affected: 15.2(2)JB6
Affected: 15.2(2)JAX
Affected: 15.3(3)M
Affected: 15.3(3)M1
Affected: 15.3(3)M2
Affected: 15.3(3)M3
Affected: 15.3(3)M5
Affected: 15.3(3)M4
Affected: 15.3(3)M6
Affected: 15.3(3)M7
Affected: 15.3(3)M8
Affected: 15.3(3)M9
Affected: 15.3(3)M10
Affected: 15.3(3)M8a
Affected: 15.2(4)JN
Affected: 15.2(1)EY
Affected: 15.0(2)EJ
Affected: 15.0(2)EJ1
Affected: 15.2(1)SY
Affected: 15.2(1)SY1
Affected: 15.2(1)SY0a
Affected: 15.2(1)SY2
Affected: 15.2(2)SY
Affected: 15.2(1)SY1a
Affected: 15.2(2)SY1
Affected: 15.2(2)SY2
Affected: 15.2(1)SY3
Affected: 15.2(1)SY4
Affected: 15.2(2)SY3
Affected: 15.2(1)SY5
Affected: 15.2(1)SY6
Affected: 15.2(1)SY7
Affected: 15.2(1)SY8
Affected: 15.2(5)EX
Affected: 15.0(2)EK
Affected: 15.0(2)EK1
Affected: 15.4(1)CG
Affected: 15.4(1)CG1
Affected: 15.4(2)CG
Affected: 15.5(1)S
Affected: 15.5(2)S
Affected: 15.5(1)S1
Affected: 15.5(3)S
Affected: 15.5(1)S2
Affected: 15.5(1)S3
Affected: 15.5(2)S1
Affected: 15.5(2)S2
Affected: 15.5(3)S1
Affected: 15.5(3)S1a
Affected: 15.5(2)S3
Affected: 15.5(3)S2
Affected: 15.5(3)S0a
Affected: 15.5(3)S3
Affected: 15.5(1)S4
Affected: 15.5(2)S4
Affected: 15.5(3)S4
Affected: 15.5(3)S5
Affected: 15.5(3)S6
Affected: 15.5(3)S6a
Affected: 15.5(3)S7
Affected: 15.5(3)S6b
Affected: 15.5(3)S8
Affected: 15.5(3)S9
Affected: 15.5(3)S10
Affected: 15.5(3)S9a
Affected: 15.5(1)T
Affected: 15.5(1)T1
Affected: 15.5(2)T
Affected: 15.5(1)T2
Affected: 15.5(1)T3
Affected: 15.5(2)T1
Affected: 15.5(2)T2
Affected: 15.5(2)T3
Affected: 15.5(2)T4
Affected: 15.5(1)T4
Affected: 15.2(2)EA
Affected: 15.2(2)EA1
Affected: 15.2(2)EA2
Affected: 15.2(3)EA
Affected: 15.2(4)EA
Affected: 15.2(4)EA1
Affected: 15.2(2)EA3
Affected: 15.2(4)EA3
Affected: 15.2(5)EA
Affected: 15.2(4)EA4
Affected: 15.2(4)EA5
Affected: 15.2(4)EA6
Affected: 15.2(4)EA7
Affected: 15.2(4)EA8
Affected: 15.2(4)EA9
Affected: 15.2(4)EA9a
Affected: 15.3(3)JN3
Affected: 15.3(3)JN4
Affected: 15.3(3)JN7
Affected: 15.3(3)JN8
Affected: 15.3(3)JN9
Affected: 15.5(3)M
Affected: 15.5(3)M1
Affected: 15.5(3)M0a
Affected: 15.5(3)M2
Affected: 15.5(3)M3
Affected: 15.5(3)M4
Affected: 15.5(3)M4a
Affected: 15.5(3)M5
Affected: 15.5(3)M6
Affected: 15.5(3)M7
Affected: 15.5(3)M6a
Affected: 15.5(3)M8
Affected: 15.5(3)M9
Affected: 15.5(3)M10
Affected: 15.3(3)JA1m
Affected: 15.3(3)JA1
Affected: 15.3(3)JA4
Affected: 15.3(3)JA5
Affected: 15.3(3)JA6
Affected: 15.3(3)JA7
Affected: 15.3(3)JA8
Affected: 15.3(3)JA10
Affected: 15.3(3)JA11
Affected: 15.3(3)JA12
Affected: 15.3(3)JAA
Affected: 15.3(3)JAA11
Affected: 15.3(3)JAA12
Affected: 15.3(3)JAB
Affected: 15.3(3)JB
Affected: 15.5(3)SN
Affected: 15.0(2)SQD
Affected: 15.0(2)SQD1
Affected: 15.0(2)SQD2
Affected: 15.0(2)SQD3
Affected: 15.0(2)SQD4
Affected: 15.0(2)SQD5
Affected: 15.0(2)SQD6
Affected: 15.0(2)SQD7
Affected: 15.0(2)SQD8
Affected: 15.6(1)S
Affected: 15.6(2)S
Affected: 15.6(2)S1
Affected: 15.6(1)S1
Affected: 15.6(1)S2
Affected: 15.6(2)S2
Affected: 15.6(1)S3
Affected: 15.6(2)S3
Affected: 15.6(1)S4
Affected: 15.6(2)S4
Affected: 15.6(1)T
Affected: 15.6(2)T
Affected: 15.6(1)T0a
Affected: 15.6(1)T1
Affected: 15.6(2)T1
Affected: 15.6(1)T2
Affected: 15.6(2)T2
Affected: 15.6(1)T3
Affected: 15.6(2)T3
Affected: 15.3(3)JNB
Affected: 15.3(3)JNB1
Affected: 15.3(3)JNB2
Affected: 15.3(3)JNB3
Affected: 15.3(3)JNB4
Affected: 15.3(3)JNB6
Affected: 15.3(3)JNB5
Affected: 15.3(3)JAX
Affected: 15.3(3)JAX1
Affected: 15.3(3)JAX2
Affected: 15.3(3)JBB
Affected: 15.3(3)JBB1
Affected: 15.3(3)JBB2
Affected: 15.3(3)JBB4
Affected: 15.3(3)JBB5
Affected: 15.3(3)JBB6
Affected: 15.3(3)JBB8
Affected: 15.3(3)JBB6a
Affected: 15.3(3)JC
Affected: 15.3(3)JC1
Affected: 15.3(3)JC2
Affected: 15.3(3)JC3
Affected: 15.3(3)JC4
Affected: 15.3(3)JC5
Affected: 15.3(3)JC6
Affected: 15.3(3)JC8
Affected: 15.3(3)JC9
Affected: 15.3(3)JC14
Affected: 15.3(1)SY
Affected: 15.3(1)SY1
Affected: 15.3(1)SY2
Affected: 15.3(3)JNC
Affected: 15.3(3)JNC1
Affected: 15.3(3)JNC4
Affected: 15.3(3)JNP
Affected: 15.3(3)JNP1
Affected: 15.3(3)JNP3
Affected: 15.6(2)SP
Affected: 15.6(2)SP1
Affected: 15.6(2)SP2
Affected: 15.6(2)SP3
Affected: 15.6(2)SP4
Affected: 15.6(2)SP5
Affected: 15.6(2)SP6
Affected: 15.6(2)SP7
Affected: 15.6(2)SP8
Affected: 15.6(2)SP9
Affected: 15.6(2)SN
Affected: 15.3(3)JPB
Affected: 15.3(3)JPB1
Affected: 15.3(3)JD
Affected: 15.3(3)JD2
Affected: 15.3(3)JD3
Affected: 15.3(3)JD4
Affected: 15.3(3)JD5
Affected: 15.3(3)JD6
Affected: 15.3(3)JD7
Affected: 15.3(3)JD8
Affected: 15.3(3)JD9
Affected: 15.3(3)JD11
Affected: 15.3(3)JD13
Affected: 15.3(3)JD14
Affected: 15.3(3)JD16
Affected: 15.3(3)JD17
Affected: 15.6(3)M
Affected: 15.6(3)M1
Affected: 15.6(3)M0a
Affected: 15.6(3)M1b
Affected: 15.6(3)M2
Affected: 15.6(3)M2a
Affected: 15.6(3)M3
Affected: 15.6(3)M3a
Affected: 15.6(3)M4
Affected: 15.6(3)M5
Affected: 15.6(3)M6
Affected: 15.6(3)M7
Affected: 15.6(3)M6a
Affected: 15.6(3)M6b
Affected: 15.6(3)M8
Affected: 15.6(3)M9
Affected: 15.2(4)EC1
Affected: 15.2(4)EC2
Affected: 15.3(3)JPC
Affected: 15.3(3)JPC1
Affected: 15.3(3)JPC2
Affected: 15.3(3)JPC3
Affected: 15.3(3)JPC5
Affected: 15.3(3)JND
Affected: 15.3(3)JND1
Affected: 15.3(3)JND2
Affected: 15.3(3)JND3
Affected: 15.4(1)SY
Affected: 15.4(1)SY1
Affected: 15.4(1)SY2
Affected: 15.4(1)SY3
Affected: 15.4(1)SY4
Affected: 15.3(3)JE
Affected: 15.3(3)JPD
Affected: 15.3(3)JDA7
Affected: 15.3(3)JDA8
Affected: 15.3(3)JDA9
Affected: 15.3(3)JDA11
Affected: 15.3(3)JDA13
Affected: 15.3(3)JDA14
Affected: 15.3(3)JDA16
Affected: 15.3(3)JDA17
Affected: 15.5(1)SY
Affected: 15.5(1)SY1
Affected: 15.5(1)SY2
Affected: 15.5(1)SY3
Affected: 15.5(1)SY4
Affected: 15.5(1)SY5
Affected: 15.5(1)SY6
Affected: 15.5(1)SY7
Affected: 15.5(1)SY8
Affected: 15.5(1)SY9
Affected: 15.5(1)SY10
Affected: 15.5(1)SY11
Affected: 15.5(1)SY12
Affected: 15.5(1)SY13
Affected: 15.5(1)SY14
Affected: 15.5(1)SY15
Affected: 15.3(3)JF
Affected: 15.3(3)JF1
Affected: 15.3(3)JF2
Affected: 15.3(3)JF4
Affected: 15.3(3)JF5
Affected: 15.3(3)JF6
Affected: 15.3(3)JF7
Affected: 15.3(3)JF8
Affected: 15.3(3)JF9
Affected: 15.3(3)JF10
Affected: 15.3(3)JF11
Affected: 15.3(3)JF12
Affected: 15.3(3)JF12i
Affected: 15.3(3)JF14
Affected: 15.3(3)JF14i
Affected: 15.3(3)JF15
Affected: 15.3(3)JCA7
Affected: 15.3(3)JCA8
Affected: 15.3(3)JCA9
Affected: 15.7(3)M
Affected: 15.7(3)M1
Affected: 15.7(3)M0a
Affected: 15.7(3)M3
Affected: 15.7(3)M2
Affected: 15.7(3)M4
Affected: 15.7(3)M5
Affected: 15.7(3)M4a
Affected: 15.7(3)M4b
Affected: 15.7(3)M6
Affected: 15.7(3)M7
Affected: 15.7(3)M8
Affected: 15.7(3)M9
Affected: 15.3(3)JG
Affected: 15.3(3)JG1
Affected: 15.3(3)JH
Affected: 15.3(3)JH1
Affected: 15.3(3)JI1
Affected: 15.3(3)JI3
Affected: 15.3(3)JI4
Affected: 15.3(3)JI5
Affected: 15.3(3)JI6
Affected: 15.8(3)M
Affected: 15.8(3)M1
Affected: 15.8(3)M0a
Affected: 15.8(3)M0b
Affected: 15.8(3)M2
Affected: 15.8(3)M1a
Affected: 15.8(3)M3
Affected: 15.8(3)M2a
Affected: 15.8(3)M4
Affected: 15.8(3)M3a
Affected: 15.8(3)M3b
Affected: 15.8(3)M5
Affected: 15.8(3)M6
Affected: 15.8(3)M7
Affected: 15.8(3)M8
Affected: 15.8(3)M9
Affected: 15.9(3)M
Affected: 15.9(3)M1
Affected: 15.9(3)M0a
Affected: 15.9(3)M2
Affected: 15.9(3)M3
Affected: 15.9(3)M2a
Affected: 15.9(3)M3a
Affected: 15.9(3)M4
Affected: 15.9(3)M3b
Affected: 15.9(3)M5
Affected: 15.9(3)M4a
Affected: 15.9(3)M6
Affected: 15.9(3)M7
Affected: 15.9(3)M6a
Affected: 15.9(3)M6b
Affected: 15.9(3)M8
Affected: 15.9(3)M7a
Affected: 15.9(3)M9
Affected: 15.9(3)M8b
Affected: 15.9(3)M10
Affected: 15.9(3)M11
Affected: 15.3(3)JK
Affected: 15.3(3)JK1
Affected: 15.3(3)JK2
Affected: 15.3(3)JK3
Affected: 15.3(3)JK2a
Affected: 15.3(3)JK1t
Affected: 15.3(3)JK4
Affected: 15.3(3)JK5
Affected: 15.3(3)JK6
Affected: 15.3(3)JK7
Affected: 15.3(3)JK8
Affected: 15.3(3)JK8a
Affected: 15.3(3)JK8b
Affected: 15.3(3)JK9
Affected: 15.3(3)JK10
Affected: 15.3(3)JK11
Affected: 15.3(3)JJ
Affected: 15.3(3)JJ1
Affected: 15.3(3)JPI1
Affected: 15.3(3)JPI4
Affected: 15.3(3)JPI1t
Affected: 15.3(3)JPI5
Affected: 15.3(3)JPI7
Affected: 15.3(3)JPI6a
Affected: 15.3(3)JPI8a
Affected: 15.3(3)JPI9
Affected: 15.3(3)JPI10
Affected: 15.3(3)JPJ2
Affected: 15.3(3)JPJ3
Affected: 15.3(3)JPJ2t
Affected: 15.3(3)JPJ3a
Affected: 15.3(3)JPJ4
Affected: 15.3(3)JPJ5
Affected: 15.3(3)JPJ6
Affected: 15.3(3)JPJ7
Affected: 15.3(3)JPJ7c
Affected: 15.3(3)JPJ8a
Affected: 15.3(3)JPJ9
Affected: 15.3(3)JPJ10
Affected: 15.3(3)JPJ11
Affected: 15.3(3)JPK
Affected: 15.3(3)JPK1
Affected: 15.3(3)JPK2
Affected: 15.3(3)JPK3
Affected: 15.3(3)JPK4
Affected: 15.3(3)JPK5
Affected: 15.3(3)JPK6
Affected: 15.3(3)JPK7
Affected: 15.3(3)JPK8
Affected: 15.3(3)JPK9
Affected: 15.3(3)JPL
Affected: 15.3(3)JPM
Affected: 15.3(3)JPN
Affected: 15.3(3)JPN1
Affected: 15.3(3)JPN2
Affected: 15.3(3)JPN3
Affected: 15.3(3)JPN4
Affected: 15.3(3)JPN5
Affected: 15.3(3)JPN6
Affected: 15.3(3)JPO
Affected: 15.3(3)JPP
Affected: 15.3(3)JPQ
Affected: 15.3(3)JPQ1
Affected: 15.3(3)JPQ2
Affected: 15.3(3)JPQ3
Affected: 15.3(3)JPQ4
Affected: 15.3(3)JPQ5
Affected: 15.3(3)JPR
Affected: 15.3(3)JPS
Affected: 15.3(3)JPT
Affected: 15.3(3)JPT1
Affected: 15.3(3)JPT2
Create a notification for this product.
    Cisco Cisco IOS XE Software Affected: 3.5.0E
Affected: 3.5.1E
Affected: 3.5.2E
Affected: 3.5.3E
Affected: 3.6.0E
Affected: 3.6.1E
Affected: 3.6.2aE
Affected: 3.6.2E
Affected: 3.6.3E
Affected: 3.6.4E
Affected: 3.6.5E
Affected: 3.6.6E
Affected: 3.6.5aE
Affected: 3.6.7E
Affected: 3.6.8E
Affected: 3.6.7bE
Affected: 3.6.9E
Affected: 3.6.10E
Affected: 3.14.0S
Affected: 3.14.1S
Affected: 3.14.2S
Affected: 3.14.3S
Affected: 3.14.4S
Affected: 3.15.0S
Affected: 3.15.1S
Affected: 3.15.2S
Affected: 3.15.1cS
Affected: 3.15.3S
Affected: 3.15.4S
Affected: 3.7.0E
Affected: 3.7.1E
Affected: 3.7.2E
Affected: 3.7.3E
Affected: 3.7.4E
Affected: 3.7.5E
Affected: 3.5.0SQ
Affected: 3.5.1SQ
Affected: 3.5.2SQ
Affected: 3.5.3SQ
Affected: 3.5.4SQ
Affected: 3.5.5SQ
Affected: 3.5.6SQ
Affected: 3.5.7SQ
Affected: 3.5.8SQ
Affected: 3.16.0S
Affected: 3.16.1S
Affected: 3.16.1aS
Affected: 3.16.2S
Affected: 3.16.2aS
Affected: 3.16.0cS
Affected: 3.16.3S
Affected: 3.16.2bS
Affected: 3.16.3aS
Affected: 3.16.4S
Affected: 3.16.4aS
Affected: 3.16.4bS
Affected: 3.16.5S
Affected: 3.16.4dS
Affected: 3.16.6S
Affected: 3.16.7S
Affected: 3.16.6bS
Affected: 3.16.7aS
Affected: 3.16.7bS
Affected: 3.16.8S
Affected: 3.16.9S
Affected: 3.16.10S
Affected: 3.17.0S
Affected: 3.17.1S
Affected: 3.17.2S
Affected: 3.17.1aS
Affected: 3.17.3S
Affected: 3.17.4S
Affected: 3.8.0E
Affected: 3.8.1E
Affected: 3.8.2E
Affected: 3.8.3E
Affected: 3.8.4E
Affected: 3.8.5E
Affected: 3.8.5aE
Affected: 3.8.6E
Affected: 3.8.7E
Affected: 3.8.8E
Affected: 3.8.9E
Affected: 3.8.10E
Affected: 3.18.0aS
Affected: 3.18.0S
Affected: 3.18.1S
Affected: 3.18.2S
Affected: 3.18.3S
Affected: 3.18.4S
Affected: 3.18.0SP
Affected: 3.18.1SP
Affected: 3.18.1aSP
Affected: 3.18.1bSP
Affected: 3.18.1cSP
Affected: 3.18.2SP
Affected: 3.18.2aSP
Affected: 3.18.3SP
Affected: 3.18.4SP
Affected: 3.18.3aSP
Affected: 3.18.3bSP
Affected: 3.18.5SP
Affected: 3.18.6SP
Affected: 3.18.7SP
Affected: 3.18.8aSP
Affected: 3.18.9SP
Affected: 3.9.0E
Affected: 3.9.1E
Affected: 3.9.2E
Affected: 16.6.1
Affected: 16.6.2
Affected: 16.6.3
Affected: 16.6.4
Affected: 16.6.5
Affected: 16.6.4a
Affected: 16.6.5a
Affected: 16.6.6
Affected: 16.6.7
Affected: 16.6.8
Affected: 16.6.9
Affected: 16.6.10
Affected: 16.7.1
Affected: 16.7.1a
Affected: 16.7.1b
Affected: 16.7.2
Affected: 16.7.3
Affected: 16.7.4
Affected: 16.8.1
Affected: 16.8.1a
Affected: 16.8.1b
Affected: 16.8.1s
Affected: 16.8.1c
Affected: 16.8.1d
Affected: 16.8.2
Affected: 16.8.1e
Affected: 16.8.3
Affected: 16.9.1
Affected: 16.9.2
Affected: 16.9.1a
Affected: 16.9.1b
Affected: 16.9.1s
Affected: 16.9.3
Affected: 16.9.4
Affected: 16.9.3a
Affected: 16.9.5
Affected: 16.9.5f
Affected: 16.9.6
Affected: 16.9.7
Affected: 16.9.8
Affected: 16.10.1
Affected: 16.10.1a
Affected: 16.10.1b
Affected: 16.10.1s
Affected: 16.10.1c
Affected: 16.10.1e
Affected: 16.10.1d
Affected: 16.10.2
Affected: 16.10.1f
Affected: 16.10.1g
Affected: 16.10.3
Affected: 3.10.0E
Affected: 3.10.1E
Affected: 3.10.0cE
Affected: 3.10.2E
Affected: 3.10.3E
Affected: 16.11.1
Affected: 16.11.1a
Affected: 16.11.1b
Affected: 16.11.2
Affected: 16.11.1s
Affected: 16.12.1
Affected: 16.12.1s
Affected: 16.12.1a
Affected: 16.12.1c
Affected: 16.12.1w
Affected: 16.12.2
Affected: 16.12.1y
Affected: 16.12.2a
Affected: 16.12.3
Affected: 16.12.8
Affected: 16.12.2s
Affected: 16.12.1x
Affected: 16.12.1t
Affected: 16.12.4
Affected: 16.12.3s
Affected: 16.12.3a
Affected: 16.12.4a
Affected: 16.12.5
Affected: 16.12.6
Affected: 16.12.1z1
Affected: 16.12.5a
Affected: 16.12.5b
Affected: 16.12.1z2
Affected: 16.12.6a
Affected: 16.12.7
Affected: 16.12.9
Affected: 16.12.10
Affected: 16.12.10a
Affected: 16.12.11
Affected: 16.12.12
Affected: 16.12.13
Affected: 3.11.0E
Affected: 3.11.1E
Affected: 3.11.2E
Affected: 3.11.3E
Affected: 3.11.1aE
Affected: 3.11.4E
Affected: 3.11.3aE
Affected: 3.11.5E
Affected: 3.11.6E
Affected: 3.11.7E
Affected: 3.11.8E
Affected: 3.11.9E
Affected: 3.11.10E
Affected: 3.11.11E
Affected: 3.11.12E
Affected: 17.1.1
Affected: 17.1.1a
Affected: 17.1.1s
Affected: 17.1.1t
Affected: 17.1.3
Affected: 17.2.1
Affected: 17.2.1r
Affected: 17.2.1a
Affected: 17.2.1v
Affected: 17.2.2
Affected: 17.2.3
Affected: 17.3.1
Affected: 17.3.2
Affected: 17.3.3
Affected: 17.3.1a
Affected: 17.3.1w
Affected: 17.3.2a
Affected: 17.3.1x
Affected: 17.3.1z
Affected: 17.3.4
Affected: 17.3.5
Affected: 17.3.4a
Affected: 17.3.6
Affected: 17.3.4b
Affected: 17.3.4c
Affected: 17.3.5a
Affected: 17.3.5b
Affected: 17.3.7
Affected: 17.3.8
Affected: 17.3.8a
Affected: 17.4.1
Affected: 17.4.2
Affected: 17.4.1a
Affected: 17.4.1b
Affected: 17.4.2a
Affected: 17.5.1
Affected: 17.5.1a
Affected: 17.6.1
Affected: 17.6.2
Affected: 17.6.1w
Affected: 17.6.1a
Affected: 17.6.1x
Affected: 17.6.3
Affected: 17.6.1y
Affected: 17.6.1z
Affected: 17.6.3a
Affected: 17.6.4
Affected: 17.6.1z1
Affected: 17.6.5
Affected: 17.6.6
Affected: 17.6.6a
Affected: 17.6.5a
Affected: 17.6.7
Affected: 17.6.8
Affected: 17.6.8a
Affected: 17.7.1
Affected: 17.7.1a
Affected: 17.7.1b
Affected: 17.7.2
Affected: 17.10.1
Affected: 17.10.1a
Affected: 17.10.1b
Affected: 17.8.1
Affected: 17.8.1a
Affected: 17.9.1
Affected: 17.9.1w
Affected: 17.9.2
Affected: 17.9.1a
Affected: 17.9.1x
Affected: 17.9.1y
Affected: 17.9.3
Affected: 17.9.2a
Affected: 17.9.1x1
Affected: 17.9.3a
Affected: 17.9.4
Affected: 17.9.1y1
Affected: 17.9.5
Affected: 17.9.4a
Affected: 17.9.5a
Affected: 17.9.5b
Affected: 17.9.6
Affected: 17.9.6a
Affected: 17.9.7
Affected: 17.9.5e
Affected: 17.9.5f
Affected: 17.9.7a
Affected: 17.9.7b
Affected: 17.11.1
Affected: 17.11.1a
Affected: 17.12.1
Affected: 17.12.1w
Affected: 17.12.1a
Affected: 17.12.1x
Affected: 17.12.2
Affected: 17.12.3
Affected: 17.12.2a
Affected: 17.12.1y
Affected: 17.12.1z
Affected: 17.12.4
Affected: 17.12.3a
Affected: 17.12.1z1
Affected: 17.12.1z2
Affected: 17.12.4a
Affected: 17.12.5
Affected: 17.12.4b
Affected: 17.12.1z3
Affected: 17.12.5a
Affected: 17.12.1z4
Affected: 17.12.5b
Affected: 17.12.5c
Affected: 17.13.1
Affected: 17.13.1a
Affected: 17.14.1
Affected: 17.14.1a
Affected: 17.15.1
Affected: 17.15.1w
Affected: 17.15.1a
Affected: 17.15.2
Affected: 17.15.1b
Affected: 17.15.1x
Affected: 17.15.1z
Affected: 17.15.3
Affected: 17.15.2c
Affected: 17.15.2a
Affected: 17.15.1y
Affected: 17.15.2b
Affected: 17.15.3a
Affected: 17.15.4
Affected: 17.15.3b
Affected: 17.16.1
Affected: 17.16.1a
Affected: 17.17.1
Affected: 17.18.1
Create a notification for this product.
    Cisco Cisco IOS XE Catalyst SD-WAN Affected: 16.9.1
Affected: 16.9.2
Affected: 16.9.3
Affected: 16.9.4
Affected: 16.10.1
Affected: 16.10.2
Affected: 16.10.3
Affected: 16.10.3a
Affected: 16.10.3b
Affected: 16.10.4
Affected: 16.10.5
Affected: 16.10.6
Affected: 16.11.1a
Affected: 16.12.1b
Affected: 16.12.1d
Affected: 16.12.1e
Affected: 16.12.2r
Affected: 16.12.3
Affected: 16.12.4
Affected: 16.12.4a
Affected: 16.12.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20352",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-27T03:55:24.975809Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2025-09-29",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T22:45:17.376Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2025-09-29T00:00:00+00:00",
            "value": "CVE-2025-20352 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "12.2(55)SE"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE3"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE2"
            },
            {
              "status": "affected",
              "version": "12.2(58)SE"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE1"
            },
            {
              "status": "affected",
              "version": "12.2(58)SE1"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE4"
            },
            {
              "status": "affected",
              "version": "12.2(58)SE2"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE5"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE6"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE7"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE8"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE9"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE10"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE11"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE12"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE13"
            },
            {
              "status": "affected",
              "version": "12.2(58)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(53)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(55)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ1"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ2"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ3"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ4"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ5"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ6"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ7"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ8"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ9"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ10"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ11"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ12"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ13"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ14"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ15"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI2"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI3"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI5"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI4a"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI4"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI2a"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI6"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI7"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI1"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI8"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI9"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI8a"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI10"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI11"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI12"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI13"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI14"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ2"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ1"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ3"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ4"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ5"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ6"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ7"
            },
            {
              "status": "affected",
              "version": "15.3(1)T"
            },
            {
              "status": "affected",
              "version": "15.3(2)T"
            },
            {
              "status": "affected",
              "version": "15.3(1)T1"
            },
            {
              "status": "affected",
              "version": "15.3(1)T2"
            },
            {
              "status": "affected",
              "version": "15.3(1)T3"
            },
            {
              "status": "affected",
              "version": "15.3(1)T4"
            },
            {
              "status": "affected",
              "version": "15.3(2)T1"
            },
            {
              "status": "affected",
              "version": "15.3(2)T2"
            },
            {
              "status": "affected",
              "version": "15.3(2)T3"
            },
            {
              "status": "affected",
              "version": "15.3(2)T4"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY3"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE1"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE2"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE8"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE9"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE10"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE11"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE10a"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE12"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE13"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY7"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY8"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY7a"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY9"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY10"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ1"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ2"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ3"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ4"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ5"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ6"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ7"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ8"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ9"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ10"
            },
            {
              "status": "affected",
              "version": "15.1(1)SG"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG"
            },
            {
              "status": "affected",
              "version": "15.1(1)SG1"
            },
            {
              "status": "affected",
              "version": "15.1(1)SG2"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG1"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG2"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG3"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG4"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG5"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG6"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG7"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG8"
            },
            {
              "status": "affected",
              "version": "15.2(4)M"
            },
            {
              "status": "affected",
              "version": "15.2(4)M1"
            },
            {
              "status": "affected",
              "version": "15.2(4)M2"
            },
            {
              "status": "affected",
              "version": "15.2(4)M4"
            },
            {
              "status": "affected",
              "version": "15.2(4)M3"
            },
            {
              "status": "affected",
              "version": "15.2(4)M5"
            },
            {
              "status": "affected",
              "version": "15.2(4)M8"
            },
            {
              "status": "affected",
              "version": "15.2(4)M10"
            },
            {
              "status": "affected",
              "version": "15.2(4)M7"
            },
            {
              "status": "affected",
              "version": "15.2(4)M6"
            },
            {
              "status": "affected",
              "version": "15.2(4)M9"
            },
            {
              "status": "affected",
              "version": "15.2(4)M6a"
            },
            {
              "status": "affected",
              "version": "15.2(4)M11"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG8"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG9"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG10"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG11"
            },
            {
              "status": "affected",
              "version": "15.2(2)GC"
            },
            {
              "status": "affected",
              "version": "15.2(3)GC"
            },
            {
              "status": "affected",
              "version": "15.2(3)GC1"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC1"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC2"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC3"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY1"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY2"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY3"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY4"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY5"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY4a"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY6"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY7"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY8"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY9"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY10"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY11"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY12"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY13"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY14"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY15"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY16"
            },
            {
              "status": "affected",
              "version": "15.4(1)T"
            },
            {
              "status": "affected",
              "version": "15.4(2)T"
            },
            {
              "status": "affected",
              "version": "15.4(1)T2"
            },
            {
              "status": "affected",
              "version": "15.4(1)T1"
            },
            {
              "status": "affected",
              "version": "15.4(1)T3"
            },
            {
              "status": "affected",
              "version": "15.4(2)T1"
            },
            {
              "status": "affected",
              "version": "15.4(2)T3"
            },
            {
              "status": "affected",
              "version": "15.4(2)T2"
            },
            {
              "status": "affected",
              "version": "15.4(1)T4"
            },
            {
              "status": "affected",
              "version": "15.4(2)T4"
            },
            {
              "status": "affected",
              "version": "15.0(2)EA"
            },
            {
              "status": "affected",
              "version": "15.0(2)EA1"
            },
            {
              "status": "affected",
              "version": "15.2(1)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E"
            },
            {
              "status": "affected",
              "version": "15.2(1)E1"
            },
            {
              "status": "affected",
              "version": "15.2(3)E"
            },
            {
              "status": "affected",
              "version": "15.2(1)E2"
            },
            {
              "status": "affected",
              "version": "15.2(1)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3a)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5"
            },
            {
              "status": "affected",
              "version": "15.2(4)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E4"
            },
            {
              "status": "affected",
              "version": "15.2(5)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E6"
            },
            {
              "status": "affected",
              "version": "15.2(5a)E"
            },
            {
              "status": "affected",
              "version": "15.2(5)E1"
            },
            {
              "status": "affected",
              "version": "15.2(5b)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5a"
            },
            {
              "status": "affected",
              "version": "15.2(5c)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5b"
            },
            {
              "status": "affected",
              "version": "15.2(5a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E7"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2"
            },
            {
              "status": "affected",
              "version": "15.2(6)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E5"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2c"
            },
            {
              "status": "affected",
              "version": "15.2(2)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E1"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0c"
            },
            {
              "status": "affected",
              "version": "15.2(4)E6"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2)E9"
            },
            {
              "status": "affected",
              "version": "15.2(4)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E10"
            },
            {
              "status": "affected",
              "version": "15.2(4)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0s"
            },
            {
              "status": "affected",
              "version": "15.2(6)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E9"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2"
            },
            {
              "status": "affected",
              "version": "15.2(7a)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1a"
            },
            {
              "status": "affected",
              "version": "15.2(7b)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3k"
            },
            {
              "status": "affected",
              "version": "15.2(8)E"
            },
            {
              "status": "affected",
              "version": "15.2(8)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E5"
            },
            {
              "status": "affected",
              "version": "15.2(7)E6"
            },
            {
              "status": "affected",
              "version": "15.2(8)E2"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10d"
            },
            {
              "status": "affected",
              "version": "15.2(7)E7"
            },
            {
              "status": "affected",
              "version": "15.2(8)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E8"
            },
            {
              "status": "affected",
              "version": "15.2(8)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E9"
            },
            {
              "status": "affected",
              "version": "15.2(8)E5"
            },
            {
              "status": "affected",
              "version": "15.2(8)E6"
            },
            {
              "status": "affected",
              "version": "15.2(7)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E11"
            },
            {
              "status": "affected",
              "version": "15.2(8)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E12"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB2"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB3"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB1"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB2"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3a"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB4"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB4"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3h"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3b"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB5"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB6"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB5"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB6"
            },
            {
              "status": "affected",
              "version": "15.2(2)JAX"
            },
            {
              "status": "affected",
              "version": "15.3(3)M"
            },
            {
              "status": "affected",
              "version": "15.3(3)M1"
            },
            {
              "status": "affected",
              "version": "15.3(3)M2"
            },
            {
              "status": "affected",
              "version": "15.3(3)M3"
            },
            {
              "status": "affected",
              "version": "15.3(3)M5"
            },
            {
              "status": "affected",
              "version": "15.3(3)M4"
            },
            {
              "status": "affected",
              "version": "15.3(3)M6"
            },
            {
              "status": "affected",
              "version": "15.3(3)M7"
            },
            {
              "status": "affected",
              "version": "15.3(3)M8"
            },
            {
              "status": "affected",
              "version": "15.3(3)M9"
            },
            {
              "status": "affected",
              "version": "15.3(3)M10"
            },
            {
              "status": "affected",
              "version": "15.3(3)M8a"
            },
            {
              "status": "affected",
              "version": "15.2(4)JN"
            },
            {
              "status": "affected",
              "version": "15.2(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(2)EJ"
            },
            {
              "status": "affected",
              "version": "15.0(2)EJ1"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY0a"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY1a"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY1"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY2"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY3"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY7"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY8"
            },
            {
              "status": "affected",
              "version": "15.2(5)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EK"
            },
            {
              "status": "affected",
              "version": "15.0(2)EK1"
            },
            {
              "status": "affected",
              "version": "15.4(1)CG"
            },
            {
              "status": "affected",
              "version": "15.4(1)CG1"
            },
            {
              "status": "affected",
              "version": "15.4(2)CG"
            },
            {
              "status": "affected",
              "version": "15.5(1)S"
            },
            {
              "status": "affected",
              "version": "15.5(2)S"
            },
            {
              "status": "affected",
              "version": "15.5(1)S1"
            },
            {
              "status": "affected",
              "version": "15.5(3)S"
            },
            {
              "status": "affected",
              "version": "15.5(1)S2"
            },
            {
              "status": "affected",
              "version": "15.5(1)S3"
            },
            {
              "status": "affected",
              "version": "15.5(2)S1"
            },
            {
              "status": "affected",
              "version": "15.5(2)S2"
            },
            {
              "status": "affected",
              "version": "15.5(3)S1"
            },
            {
              "status": "affected",
              "version": "15.5(3)S1a"
            },
            {
              "status": "affected",
              "version": "15.5(2)S3"
            },
            {
              "status": "affected",
              "version": "15.5(3)S2"
            },
            {
              "status": "affected",
              "version": "15.5(3)S0a"
            },
            {
              "status": "affected",
              "version": "15.5(3)S3"
            },
            {
              "status": "affected",
              "version": "15.5(1)S4"
            },
            {
              "status": "affected",
              "version": "15.5(2)S4"
            },
            {
              "status": "affected",
              "version": "15.5(3)S4"
            },
            {
              "status": "affected",
              "version": "15.5(3)S5"
            },
            {
              "status": "affected",
              "version": "15.5(3)S6"
            },
            {
              "status": "affected",
              "version": "15.5(3)S6a"
            },
            {
              "status": "affected",
              "version": "15.5(3)S7"
            },
            {
              "status": "affected",
              "version": "15.5(3)S6b"
            },
            {
              "status": "affected",
              "version": "15.5(3)S8"
            },
            {
              "status": "affected",
              "version": "15.5(3)S9"
            },
            {
              "status": "affected",
              "version": "15.5(3)S10"
            },
            {
              "status": "affected",
              "version": "15.5(3)S9a"
            },
            {
              "status": "affected",
              "version": "15.5(1)T"
            },
            {
              "status": "affected",
              "version": "15.5(1)T1"
            },
            {
              "status": "affected",
              "version": "15.5(2)T"
            },
            {
              "status": "affected",
              "version": "15.5(1)T2"
            },
            {
              "status": "affected",
              "version": "15.5(1)T3"
            },
            {
              "status": "affected",
              "version": "15.5(2)T1"
            },
            {
              "status": "affected",
              "version": "15.5(2)T2"
            },
            {
              "status": "affected",
              "version": "15.5(2)T3"
            },
            {
              "status": "affected",
              "version": "15.5(2)T4"
            },
            {
              "status": "affected",
              "version": "15.5(1)T4"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA1"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA2"
            },
            {
              "status": "affected",
              "version": "15.2(3)EA"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA1"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA3"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA3"
            },
            {
              "status": "affected",
              "version": "15.2(5)EA"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA4"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA5"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA6"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA7"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA8"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN9"
            },
            {
              "status": "affected",
              "version": "15.5(3)M"
            },
            {
              "status": "affected",
              "version": "15.5(3)M1"
            },
            {
              "status": "affected",
              "version": "15.5(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.5(3)M2"
            },
            {
              "status": "affected",
              "version": "15.5(3)M3"
            },
            {
              "status": "affected",
              "version": "15.5(3)M4"
            },
            {
              "status": "affected",
              "version": "15.5(3)M4a"
            },
            {
              "status": "affected",
              "version": "15.5(3)M5"
            },
            {
              "status": "affected",
              "version": "15.5(3)M6"
            },
            {
              "status": "affected",
              "version": "15.5(3)M7"
            },
            {
              "status": "affected",
              "version": "15.5(3)M6a"
            },
            {
              "status": "affected",
              "version": "15.5(3)M8"
            },
            {
              "status": "affected",
              "version": "15.5(3)M9"
            },
            {
              "status": "affected",
              "version": "15.5(3)M10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA1m"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA12"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAA"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAA11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAA12"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JB"
            },
            {
              "status": "affected",
              "version": "15.5(3)SN"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD8"
            },
            {
              "status": "affected",
              "version": "15.6(1)S"
            },
            {
              "status": "affected",
              "version": "15.6(2)S"
            },
            {
              "status": "affected",
              "version": "15.6(2)S1"
            },
            {
              "status": "affected",
              "version": "15.6(1)S1"
            },
            {
              "status": "affected",
              "version": "15.6(1)S2"
            },
            {
              "status": "affected",
              "version": "15.6(2)S2"
            },
            {
              "status": "affected",
              "version": "15.6(1)S3"
            },
            {
              "status": "affected",
              "version": "15.6(2)S3"
            },
            {
              "status": "affected",
              "version": "15.6(1)S4"
            },
            {
              "status": "affected",
              "version": "15.6(2)S4"
            },
            {
              "status": "affected",
              "version": "15.6(1)T"
            },
            {
              "status": "affected",
              "version": "15.6(2)T"
            },
            {
              "status": "affected",
              "version": "15.6(1)T0a"
            },
            {
              "status": "affected",
              "version": "15.6(1)T1"
            },
            {
              "status": "affected",
              "version": "15.6(2)T1"
            },
            {
              "status": "affected",
              "version": "15.6(1)T2"
            },
            {
              "status": "affected",
              "version": "15.6(2)T2"
            },
            {
              "status": "affected",
              "version": "15.6(1)T3"
            },
            {
              "status": "affected",
              "version": "15.6(2)T3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAX"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAX1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAX2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB6a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC14"
            },
            {
              "status": "affected",
              "version": "15.3(1)SY"
            },
            {
              "status": "affected",
              "version": "15.3(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.3(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNC"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNC1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNC4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNP"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNP1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNP3"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP1"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP2"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP3"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP4"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP5"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP6"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP7"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP8"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP9"
            },
            {
              "status": "affected",
              "version": "15.6(2)SN"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPB1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD13"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD14"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD16"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD17"
            },
            {
              "status": "affected",
              "version": "15.6(3)M"
            },
            {
              "status": "affected",
              "version": "15.6(3)M1"
            },
            {
              "status": "affected",
              "version": "15.6(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M1b"
            },
            {
              "status": "affected",
              "version": "15.6(3)M2"
            },
            {
              "status": "affected",
              "version": "15.6(3)M2a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M3"
            },
            {
              "status": "affected",
              "version": "15.6(3)M3a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M4"
            },
            {
              "status": "affected",
              "version": "15.6(3)M5"
            },
            {
              "status": "affected",
              "version": "15.6(3)M6"
            },
            {
              "status": "affected",
              "version": "15.6(3)M7"
            },
            {
              "status": "affected",
              "version": "15.6(3)M6a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M6b"
            },
            {
              "status": "affected",
              "version": "15.6(3)M8"
            },
            {
              "status": "affected",
              "version": "15.6(3)M9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EC1"
            },
            {
              "status": "affected",
              "version": "15.2(4)EC2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND3"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JE"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPD"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA13"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA14"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA16"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA17"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY7"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY8"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY9"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY10"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY11"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY12"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY13"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY14"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY15"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF12"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF12i"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF14"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF14i"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF15"
            },
            {
              "status": "affected",
              "version": "15.3(3)JCA7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JCA8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JCA9"
            },
            {
              "status": "affected",
              "version": "15.7(3)M"
            },
            {
              "status": "affected",
              "version": "15.7(3)M1"
            },
            {
              "status": "affected",
              "version": "15.7(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.7(3)M3"
            },
            {
              "status": "affected",
              "version": "15.7(3)M2"
            },
            {
              "status": "affected",
              "version": "15.7(3)M4"
            },
            {
              "status": "affected",
              "version": "15.7(3)M5"
            },
            {
              "status": "affected",
              "version": "15.7(3)M4a"
            },
            {
              "status": "affected",
              "version": "15.7(3)M4b"
            },
            {
              "status": "affected",
              "version": "15.7(3)M6"
            },
            {
              "status": "affected",
              "version": "15.7(3)M7"
            },
            {
              "status": "affected",
              "version": "15.7(3)M8"
            },
            {
              "status": "affected",
              "version": "15.7(3)M9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JG"
            },
            {
              "status": "affected",
              "version": "15.3(3)JG1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JH"
            },
            {
              "status": "affected",
              "version": "15.3(3)JH1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI6"
            },
            {
              "status": "affected",
              "version": "15.8(3)M"
            },
            {
              "status": "affected",
              "version": "15.8(3)M1"
            },
            {
              "status": "affected",
              "version": "15.8(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M0b"
            },
            {
              "status": "affected",
              "version": "15.8(3)M2"
            },
            {
              "status": "affected",
              "version": "15.8(3)M1a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M3"
            },
            {
              "status": "affected",
              "version": "15.8(3)M2a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M4"
            },
            {
              "status": "affected",
              "version": "15.8(3)M3a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M3b"
            },
            {
              "status": "affected",
              "version": "15.8(3)M5"
            },
            {
              "status": "affected",
              "version": "15.8(3)M6"
            },
            {
              "status": "affected",
              "version": "15.8(3)M7"
            },
            {
              "status": "affected",
              "version": "15.8(3)M8"
            },
            {
              "status": "affected",
              "version": "15.8(3)M9"
            },
            {
              "status": "affected",
              "version": "15.9(3)M"
            },
            {
              "status": "affected",
              "version": "15.9(3)M1"
            },
            {
              "status": "affected",
              "version": "15.9(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M2"
            },
            {
              "status": "affected",
              "version": "15.9(3)M3"
            },
            {
              "status": "affected",
              "version": "15.9(3)M2a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M3a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M4"
            },
            {
              "status": "affected",
              "version": "15.9(3)M3b"
            },
            {
              "status": "affected",
              "version": "15.9(3)M5"
            },
            {
              "status": "affected",
              "version": "15.9(3)M4a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M6"
            },
            {
              "status": "affected",
              "version": "15.9(3)M7"
            },
            {
              "status": "affected",
              "version": "15.9(3)M6a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M6b"
            },
            {
              "status": "affected",
              "version": "15.9(3)M8"
            },
            {
              "status": "affected",
              "version": "15.9(3)M7a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M9"
            },
            {
              "status": "affected",
              "version": "15.9(3)M8b"
            },
            {
              "status": "affected",
              "version": "15.9(3)M10"
            },
            {
              "status": "affected",
              "version": "15.9(3)M11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK2a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK1t"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK8a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK8b"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JJ"
            },
            {
              "status": "affected",
              "version": "15.3(3)JJ1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI1t"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI6a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI8a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ2t"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ3a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ7c"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ8a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPL"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPM"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPO"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPP"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPR"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPS"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPT"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPT1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPT2"
            }
          ]
        },
        {
          "product": "Cisco IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.5.0E"
            },
            {
              "status": "affected",
              "version": "3.5.1E"
            },
            {
              "status": "affected",
              "version": "3.5.2E"
            },
            {
              "status": "affected",
              "version": "3.5.3E"
            },
            {
              "status": "affected",
              "version": "3.6.0E"
            },
            {
              "status": "affected",
              "version": "3.6.1E"
            },
            {
              "status": "affected",
              "version": "3.6.2aE"
            },
            {
              "status": "affected",
              "version": "3.6.2E"
            },
            {
              "status": "affected",
              "version": "3.6.3E"
            },
            {
              "status": "affected",
              "version": "3.6.4E"
            },
            {
              "status": "affected",
              "version": "3.6.5E"
            },
            {
              "status": "affected",
              "version": "3.6.6E"
            },
            {
              "status": "affected",
              "version": "3.6.5aE"
            },
            {
              "status": "affected",
              "version": "3.6.7E"
            },
            {
              "status": "affected",
              "version": "3.6.8E"
            },
            {
              "status": "affected",
              "version": "3.6.7bE"
            },
            {
              "status": "affected",
              "version": "3.6.9E"
            },
            {
              "status": "affected",
              "version": "3.6.10E"
            },
            {
              "status": "affected",
              "version": "3.14.0S"
            },
            {
              "status": "affected",
              "version": "3.14.1S"
            },
            {
              "status": "affected",
              "version": "3.14.2S"
            },
            {
              "status": "affected",
              "version": "3.14.3S"
            },
            {
              "status": "affected",
              "version": "3.14.4S"
            },
            {
              "status": "affected",
              "version": "3.15.0S"
            },
            {
              "status": "affected",
              "version": "3.15.1S"
            },
            {
              "status": "affected",
              "version": "3.15.2S"
            },
            {
              "status": "affected",
              "version": "3.15.1cS"
            },
            {
              "status": "affected",
              "version": "3.15.3S"
            },
            {
              "status": "affected",
              "version": "3.15.4S"
            },
            {
              "status": "affected",
              "version": "3.7.0E"
            },
            {
              "status": "affected",
              "version": "3.7.1E"
            },
            {
              "status": "affected",
              "version": "3.7.2E"
            },
            {
              "status": "affected",
              "version": "3.7.3E"
            },
            {
              "status": "affected",
              "version": "3.7.4E"
            },
            {
              "status": "affected",
              "version": "3.7.5E"
            },
            {
              "status": "affected",
              "version": "3.5.0SQ"
            },
            {
              "status": "affected",
              "version": "3.5.1SQ"
            },
            {
              "status": "affected",
              "version": "3.5.2SQ"
            },
            {
              "status": "affected",
              "version": "3.5.3SQ"
            },
            {
              "status": "affected",
              "version": "3.5.4SQ"
            },
            {
              "status": "affected",
              "version": "3.5.5SQ"
            },
            {
              "status": "affected",
              "version": "3.5.6SQ"
            },
            {
              "status": "affected",
              "version": "3.5.7SQ"
            },
            {
              "status": "affected",
              "version": "3.5.8SQ"
            },
            {
              "status": "affected",
              "version": "3.16.0S"
            },
            {
              "status": "affected",
              "version": "3.16.1S"
            },
            {
              "status": "affected",
              "version": "3.16.1aS"
            },
            {
              "status": "affected",
              "version": "3.16.2S"
            },
            {
              "status": "affected",
              "version": "3.16.2aS"
            },
            {
              "status": "affected",
              "version": "3.16.0cS"
            },
            {
              "status": "affected",
              "version": "3.16.3S"
            },
            {
              "status": "affected",
              "version": "3.16.2bS"
            },
            {
              "status": "affected",
              "version": "3.16.3aS"
            },
            {
              "status": "affected",
              "version": "3.16.4S"
            },
            {
              "status": "affected",
              "version": "3.16.4aS"
            },
            {
              "status": "affected",
              "version": "3.16.4bS"
            },
            {
              "status": "affected",
              "version": "3.16.5S"
            },
            {
              "status": "affected",
              "version": "3.16.4dS"
            },
            {
              "status": "affected",
              "version": "3.16.6S"
            },
            {
              "status": "affected",
              "version": "3.16.7S"
            },
            {
              "status": "affected",
              "version": "3.16.6bS"
            },
            {
              "status": "affected",
              "version": "3.16.7aS"
            },
            {
              "status": "affected",
              "version": "3.16.7bS"
            },
            {
              "status": "affected",
              "version": "3.16.8S"
            },
            {
              "status": "affected",
              "version": "3.16.9S"
            },
            {
              "status": "affected",
              "version": "3.16.10S"
            },
            {
              "status": "affected",
              "version": "3.17.0S"
            },
            {
              "status": "affected",
              "version": "3.17.1S"
            },
            {
              "status": "affected",
              "version": "3.17.2S"
            },
            {
              "status": "affected",
              "version": "3.17.1aS"
            },
            {
              "status": "affected",
              "version": "3.17.3S"
            },
            {
              "status": "affected",
              "version": "3.17.4S"
            },
            {
              "status": "affected",
              "version": "3.8.0E"
            },
            {
              "status": "affected",
              "version": "3.8.1E"
            },
            {
              "status": "affected",
              "version": "3.8.2E"
            },
            {
              "status": "affected",
              "version": "3.8.3E"
            },
            {
              "status": "affected",
              "version": "3.8.4E"
            },
            {
              "status": "affected",
              "version": "3.8.5E"
            },
            {
              "status": "affected",
              "version": "3.8.5aE"
            },
            {
              "status": "affected",
              "version": "3.8.6E"
            },
            {
              "status": "affected",
              "version": "3.8.7E"
            },
            {
              "status": "affected",
              "version": "3.8.8E"
            },
            {
              "status": "affected",
              "version": "3.8.9E"
            },
            {
              "status": "affected",
              "version": "3.8.10E"
            },
            {
              "status": "affected",
              "version": "3.18.0aS"
            },
            {
              "status": "affected",
              "version": "3.18.0S"
            },
            {
              "status": "affected",
              "version": "3.18.1S"
            },
            {
              "status": "affected",
              "version": "3.18.2S"
            },
            {
              "status": "affected",
              "version": "3.18.3S"
            },
            {
              "status": "affected",
              "version": "3.18.4S"
            },
            {
              "status": "affected",
              "version": "3.18.0SP"
            },
            {
              "status": "affected",
              "version": "3.18.1SP"
            },
            {
              "status": "affected",
              "version": "3.18.1aSP"
            },
            {
              "status": "affected",
              "version": "3.18.1bSP"
            },
            {
              "status": "affected",
              "version": "3.18.1cSP"
            },
            {
              "status": "affected",
              "version": "3.18.2SP"
            },
            {
              "status": "affected",
              "version": "3.18.2aSP"
            },
            {
              "status": "affected",
              "version": "3.18.3SP"
            },
            {
              "status": "affected",
              "version": "3.18.4SP"
            },
            {
              "status": "affected",
              "version": "3.18.3aSP"
            },
            {
              "status": "affected",
              "version": "3.18.3bSP"
            },
            {
              "status": "affected",
              "version": "3.18.5SP"
            },
            {
              "status": "affected",
              "version": "3.18.6SP"
            },
            {
              "status": "affected",
              "version": "3.18.7SP"
            },
            {
              "status": "affected",
              "version": "3.18.8aSP"
            },
            {
              "status": "affected",
              "version": "3.18.9SP"
            },
            {
              "status": "affected",
              "version": "3.9.0E"
            },
            {
              "status": "affected",
              "version": "3.9.1E"
            },
            {
              "status": "affected",
              "version": "3.9.2E"
            },
            {
              "status": "affected",
              "version": "16.6.1"
            },
            {
              "status": "affected",
              "version": "16.6.2"
            },
            {
              "status": "affected",
              "version": "16.6.3"
            },
            {
              "status": "affected",
              "version": "16.6.4"
            },
            {
              "status": "affected",
              "version": "16.6.5"
            },
            {
              "status": "affected",
              "version": "16.6.4a"
            },
            {
              "status": "affected",
              "version": "16.6.5a"
            },
            {
              "status": "affected",
              "version": "16.6.6"
            },
            {
              "status": "affected",
              "version": "16.6.7"
            },
            {
              "status": "affected",
              "version": "16.6.8"
            },
            {
              "status": "affected",
              "version": "16.6.9"
            },
            {
              "status": "affected",
              "version": "16.6.10"
            },
            {
              "status": "affected",
              "version": "16.7.1"
            },
            {
              "status": "affected",
              "version": "16.7.1a"
            },
            {
              "status": "affected",
              "version": "16.7.1b"
            },
            {
              "status": "affected",
              "version": "16.7.2"
            },
            {
              "status": "affected",
              "version": "16.7.3"
            },
            {
              "status": "affected",
              "version": "16.7.4"
            },
            {
              "status": "affected",
              "version": "16.8.1"
            },
            {
              "status": "affected",
              "version": "16.8.1a"
            },
            {
              "status": "affected",
              "version": "16.8.1b"
            },
            {
              "status": "affected",
              "version": "16.8.1s"
            },
            {
              "status": "affected",
              "version": "16.8.1c"
            },
            {
              "status": "affected",
              "version": "16.8.1d"
            },
            {
              "status": "affected",
              "version": "16.8.2"
            },
            {
              "status": "affected",
              "version": "16.8.1e"
            },
            {
              "status": "affected",
              "version": "16.8.3"
            },
            {
              "status": "affected",
              "version": "16.9.1"
            },
            {
              "status": "affected",
              "version": "16.9.2"
            },
            {
              "status": "affected",
              "version": "16.9.1a"
            },
            {
              "status": "affected",
              "version": "16.9.1b"
            },
            {
              "status": "affected",
              "version": "16.9.1s"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.9.3a"
            },
            {
              "status": "affected",
              "version": "16.9.5"
            },
            {
              "status": "affected",
              "version": "16.9.5f"
            },
            {
              "status": "affected",
              "version": "16.9.6"
            },
            {
              "status": "affected",
              "version": "16.9.7"
            },
            {
              "status": "affected",
              "version": "16.9.8"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.10.1a"
            },
            {
              "status": "affected",
              "version": "16.10.1b"
            },
            {
              "status": "affected",
              "version": "16.10.1s"
            },
            {
              "status": "affected",
              "version": "16.10.1c"
            },
            {
              "status": "affected",
              "version": "16.10.1e"
            },
            {
              "status": "affected",
              "version": "16.10.1d"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.10.1f"
            },
            {
              "status": "affected",
              "version": "16.10.1g"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "3.10.0E"
            },
            {
              "status": "affected",
              "version": "3.10.1E"
            },
            {
              "status": "affected",
              "version": "3.10.0cE"
            },
            {
              "status": "affected",
              "version": "3.10.2E"
            },
            {
              "status": "affected",
              "version": "3.10.3E"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.11.2"
            },
            {
              "status": "affected",
              "version": "16.11.1s"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.12.1s"
            },
            {
              "status": "affected",
              "version": "16.12.1a"
            },
            {
              "status": "affected",
              "version": "16.12.1c"
            },
            {
              "status": "affected",
              "version": "16.12.1w"
            },
            {
              "status": "affected",
              "version": "16.12.2"
            },
            {
              "status": "affected",
              "version": "16.12.1y"
            },
            {
              "status": "affected",
              "version": "16.12.2a"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.8"
            },
            {
              "status": "affected",
              "version": "16.12.2s"
            },
            {
              "status": "affected",
              "version": "16.12.1x"
            },
            {
              "status": "affected",
              "version": "16.12.1t"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.12.3s"
            },
            {
              "status": "affected",
              "version": "16.12.3a"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            },
            {
              "status": "affected",
              "version": "16.12.6"
            },
            {
              "status": "affected",
              "version": "16.12.1z1"
            },
            {
              "status": "affected",
              "version": "16.12.5a"
            },
            {
              "status": "affected",
              "version": "16.12.5b"
            },
            {
              "status": "affected",
              "version": "16.12.1z2"
            },
            {
              "status": "affected",
              "version": "16.12.6a"
            },
            {
              "status": "affected",
              "version": "16.12.7"
            },
            {
              "status": "affected",
              "version": "16.12.9"
            },
            {
              "status": "affected",
              "version": "16.12.10"
            },
            {
              "status": "affected",
              "version": "16.12.10a"
            },
            {
              "status": "affected",
              "version": "16.12.11"
            },
            {
              "status": "affected",
              "version": "16.12.12"
            },
            {
              "status": "affected",
              "version": "16.12.13"
            },
            {
              "status": "affected",
              "version": "3.11.0E"
            },
            {
              "status": "affected",
              "version": "3.11.1E"
            },
            {
              "status": "affected",
              "version": "3.11.2E"
            },
            {
              "status": "affected",
              "version": "3.11.3E"
            },
            {
              "status": "affected",
              "version": "3.11.1aE"
            },
            {
              "status": "affected",
              "version": "3.11.4E"
            },
            {
              "status": "affected",
              "version": "3.11.3aE"
            },
            {
              "status": "affected",
              "version": "3.11.5E"
            },
            {
              "status": "affected",
              "version": "3.11.6E"
            },
            {
              "status": "affected",
              "version": "3.11.7E"
            },
            {
              "status": "affected",
              "version": "3.11.8E"
            },
            {
              "status": "affected",
              "version": "3.11.9E"
            },
            {
              "status": "affected",
              "version": "3.11.10E"
            },
            {
              "status": "affected",
              "version": "3.11.11E"
            },
            {
              "status": "affected",
              "version": "3.11.12E"
            },
            {
              "status": "affected",
              "version": "17.1.1"
            },
            {
              "status": "affected",
              "version": "17.1.1a"
            },
            {
              "status": "affected",
              "version": "17.1.1s"
            },
            {
              "status": "affected",
              "version": "17.1.1t"
            },
            {
              "status": "affected",
              "version": "17.1.3"
            },
            {
              "status": "affected",
              "version": "17.2.1"
            },
            {
              "status": "affected",
              "version": "17.2.1r"
            },
            {
              "status": "affected",
              "version": "17.2.1a"
            },
            {
              "status": "affected",
              "version": "17.2.1v"
            },
            {
              "status": "affected",
              "version": "17.2.2"
            },
            {
              "status": "affected",
              "version": "17.2.3"
            },
            {
              "status": "affected",
              "version": "17.3.1"
            },
            {
              "status": "affected",
              "version": "17.3.2"
            },
            {
              "status": "affected",
              "version": "17.3.3"
            },
            {
              "status": "affected",
              "version": "17.3.1a"
            },
            {
              "status": "affected",
              "version": "17.3.1w"
            },
            {
              "status": "affected",
              "version": "17.3.2a"
            },
            {
              "status": "affected",
              "version": "17.3.1x"
            },
            {
              "status": "affected",
              "version": "17.3.1z"
            },
            {
              "status": "affected",
              "version": "17.3.4"
            },
            {
              "status": "affected",
              "version": "17.3.5"
            },
            {
              "status": "affected",
              "version": "17.3.4a"
            },
            {
              "status": "affected",
              "version": "17.3.6"
            },
            {
              "status": "affected",
              "version": "17.3.4b"
            },
            {
              "status": "affected",
              "version": "17.3.4c"
            },
            {
              "status": "affected",
              "version": "17.3.5a"
            },
            {
              "status": "affected",
              "version": "17.3.5b"
            },
            {
              "status": "affected",
              "version": "17.3.7"
            },
            {
              "status": "affected",
              "version": "17.3.8"
            },
            {
              "status": "affected",
              "version": "17.3.8a"
            },
            {
              "status": "affected",
              "version": "17.4.1"
            },
            {
              "status": "affected",
              "version": "17.4.2"
            },
            {
              "status": "affected",
              "version": "17.4.1a"
            },
            {
              "status": "affected",
              "version": "17.4.1b"
            },
            {
              "status": "affected",
              "version": "17.4.2a"
            },
            {
              "status": "affected",
              "version": "17.5.1"
            },
            {
              "status": "affected",
              "version": "17.5.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.1w"
            },
            {
              "status": "affected",
              "version": "17.6.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1x"
            },
            {
              "status": "affected",
              "version": "17.6.3"
            },
            {
              "status": "affected",
              "version": "17.6.1y"
            },
            {
              "status": "affected",
              "version": "17.6.1z"
            },
            {
              "status": "affected",
              "version": "17.6.3a"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.6.1z1"
            },
            {
              "status": "affected",
              "version": "17.6.5"
            },
            {
              "status": "affected",
              "version": "17.6.6"
            },
            {
              "status": "affected",
              "version": "17.6.6a"
            },
            {
              "status": "affected",
              "version": "17.6.5a"
            },
            {
              "status": "affected",
              "version": "17.6.7"
            },
            {
              "status": "affected",
              "version": "17.6.8"
            },
            {
              "status": "affected",
              "version": "17.6.8a"
            },
            {
              "status": "affected",
              "version": "17.7.1"
            },
            {
              "status": "affected",
              "version": "17.7.1a"
            },
            {
              "status": "affected",
              "version": "17.7.1b"
            },
            {
              "status": "affected",
              "version": "17.7.2"
            },
            {
              "status": "affected",
              "version": "17.10.1"
            },
            {
              "status": "affected",
              "version": "17.10.1a"
            },
            {
              "status": "affected",
              "version": "17.10.1b"
            },
            {
              "status": "affected",
              "version": "17.8.1"
            },
            {
              "status": "affected",
              "version": "17.8.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1"
            },
            {
              "status": "affected",
              "version": "17.9.1w"
            },
            {
              "status": "affected",
              "version": "17.9.2"
            },
            {
              "status": "affected",
              "version": "17.9.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1x"
            },
            {
              "status": "affected",
              "version": "17.9.1y"
            },
            {
              "status": "affected",
              "version": "17.9.3"
            },
            {
              "status": "affected",
              "version": "17.9.2a"
            },
            {
              "status": "affected",
              "version": "17.9.1x1"
            },
            {
              "status": "affected",
              "version": "17.9.3a"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.9.1y1"
            },
            {
              "status": "affected",
              "version": "17.9.5"
            },
            {
              "status": "affected",
              "version": "17.9.4a"
            },
            {
              "status": "affected",
              "version": "17.9.5a"
            },
            {
              "status": "affected",
              "version": "17.9.5b"
            },
            {
              "status": "affected",
              "version": "17.9.6"
            },
            {
              "status": "affected",
              "version": "17.9.6a"
            },
            {
              "status": "affected",
              "version": "17.9.7"
            },
            {
              "status": "affected",
              "version": "17.9.5e"
            },
            {
              "status": "affected",
              "version": "17.9.5f"
            },
            {
              "status": "affected",
              "version": "17.9.7a"
            },
            {
              "status": "affected",
              "version": "17.9.7b"
            },
            {
              "status": "affected",
              "version": "17.11.1"
            },
            {
              "status": "affected",
              "version": "17.11.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1"
            },
            {
              "status": "affected",
              "version": "17.12.1w"
            },
            {
              "status": "affected",
              "version": "17.12.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1x"
            },
            {
              "status": "affected",
              "version": "17.12.2"
            },
            {
              "status": "affected",
              "version": "17.12.3"
            },
            {
              "status": "affected",
              "version": "17.12.2a"
            },
            {
              "status": "affected",
              "version": "17.12.1y"
            },
            {
              "status": "affected",
              "version": "17.12.1z"
            },
            {
              "status": "affected",
              "version": "17.12.4"
            },
            {
              "status": "affected",
              "version": "17.12.3a"
            },
            {
              "status": "affected",
              "version": "17.12.1z1"
            },
            {
              "status": "affected",
              "version": "17.12.1z2"
            },
            {
              "status": "affected",
              "version": "17.12.4a"
            },
            {
              "status": "affected",
              "version": "17.12.5"
            },
            {
              "status": "affected",
              "version": "17.12.4b"
            },
            {
              "status": "affected",
              "version": "17.12.1z3"
            },
            {
              "status": "affected",
              "version": "17.12.5a"
            },
            {
              "status": "affected",
              "version": "17.12.1z4"
            },
            {
              "status": "affected",
              "version": "17.12.5b"
            },
            {
              "status": "affected",
              "version": "17.12.5c"
            },
            {
              "status": "affected",
              "version": "17.13.1"
            },
            {
              "status": "affected",
              "version": "17.13.1a"
            },
            {
              "status": "affected",
              "version": "17.14.1"
            },
            {
              "status": "affected",
              "version": "17.14.1a"
            },
            {
              "status": "affected",
              "version": "17.15.1"
            },
            {
              "status": "affected",
              "version": "17.15.1w"
            },
            {
              "status": "affected",
              "version": "17.15.1a"
            },
            {
              "status": "affected",
              "version": "17.15.2"
            },
            {
              "status": "affected",
              "version": "17.15.1b"
            },
            {
              "status": "affected",
              "version": "17.15.1x"
            },
            {
              "status": "affected",
              "version": "17.15.1z"
            },
            {
              "status": "affected",
              "version": "17.15.3"
            },
            {
              "status": "affected",
              "version": "17.15.2c"
            },
            {
              "status": "affected",
              "version": "17.15.2a"
            },
            {
              "status": "affected",
              "version": "17.15.1y"
            },
            {
              "status": "affected",
              "version": "17.15.2b"
            },
            {
              "status": "affected",
              "version": "17.15.3a"
            },
            {
              "status": "affected",
              "version": "17.15.4"
            },
            {
              "status": "affected",
              "version": "17.15.3b"
            },
            {
              "status": "affected",
              "version": "17.16.1"
            },
            {
              "status": "affected",
              "version": "17.16.1a"
            },
            {
              "status": "affected",
              "version": "17.17.1"
            },
            {
              "status": "affected",
              "version": "17.18.1"
            }
          ]
        },
        {
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.9.1"
            },
            {
              "status": "affected",
              "version": "16.9.2"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "16.10.3a"
            },
            {
              "status": "affected",
              "version": "16.10.3b"
            },
            {
              "status": "affected",
              "version": "16.10.4"
            },
            {
              "status": "affected",
              "version": "16.10.5"
            },
            {
              "status": "affected",
              "version": "16.10.6"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.12.1b"
            },
            {
              "status": "affected",
              "version": "16.12.1d"
            },
            {
              "status": "affected",
              "version": "16.12.1e"
            },
            {
              "status": "affected",
              "version": "16.12.2r"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) became aware of successful exploitation of this vulnerability in the wild after local Administrator credentials were compromised. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "Stack-based Buffer Overflow",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-30T16:18:05.082Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-snmp-x4LPhte",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"
        }
      ],
      "source": {
        "advisory": "cisco-sa-snmp-x4LPhte",
        "defects": [
          "CSCwq31287"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20352",
    "datePublished": "2025-09-24T17:10:42.891Z",
    "dateReserved": "2024-10-10T19:15:13.257Z",
    "dateUpdated": "2025-10-21T22:45:17.376Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20151 (GCVE-0-2025-20151)

Vulnerability from cvelistv5 – Published: 2025-05-07 17:18 – Updated: 2025-05-07 19:46
VLAI?
Summary
A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration. This vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied. Note: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials. For more information, see the section of this advisory.
CWE
Assigner
Impacted products
Vendor Product Version
Cisco Cisco IOS XE Catalyst SD-WAN Affected: 16.10.6
Affected: 16.12.3
Affected: 16.12.1
Affected: 16.12.1a
Affected: 16.12.4a
Affected: 16.12.2r
Affected: 16.12.1c
Affected: 16.10.4
Affected: 16.12.1b1
Affected: 16.10.5
Affected: 16.12.4
Affected: 16.10.3
Affected: 16.10.3a
Affected: 16.12.1b
Affected: 16.10.3b
Affected: 16.12.1d
Affected: 16.11.1s
Affected: 16.9.1
Affected: 16.11.1a
Affected: 16.11.1d
Affected: 16.9.2
Affected: 16.10.1
Affected: 16.11.1f
Affected: 16.9.4
Affected: 16.9.3
Affected: 16.10.2
Affected: 16.12.1e
Affected: 16.11.1b
Affected: 16.11.1
Affected: 16.12.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20151",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-07T18:56:21.184209Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:46:24.894Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.10.6"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.12.1a"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.2r"
            },
            {
              "status": "affected",
              "version": "16.12.1c"
            },
            {
              "status": "affected",
              "version": "16.10.4"
            },
            {
              "status": "affected",
              "version": "16.12.1b1"
            },
            {
              "status": "affected",
              "version": "16.10.5"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "16.10.3a"
            },
            {
              "status": "affected",
              "version": "16.12.1b"
            },
            {
              "status": "affected",
              "version": "16.10.3b"
            },
            {
              "status": "affected",
              "version": "16.12.1d"
            },
            {
              "status": "affected",
              "version": "16.11.1s"
            },
            {
              "status": "affected",
              "version": "16.9.1"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.11.1d"
            },
            {
              "status": "affected",
              "version": "16.9.2"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.11.1f"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.12.1e"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration.\r\n\r\nThis vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied.\r\nNote: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials.\r\nFor more information, see the  section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-16",
              "description": "Configuration",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-07T17:18:44.414Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-snmpv3-qKEYvzsy",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpv3-qKEYvzsy"
        }
      ],
      "source": {
        "advisory": "cisco-sa-snmpv3-qKEYvzsy",
        "defects": [
          "CSCwi84832"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20151",
    "datePublished": "2025-05-07T17:18:44.414Z",
    "dateReserved": "2024-10-10T19:15:13.216Z",
    "dateUpdated": "2025-05-07T19:46:24.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20373 (GCVE-0-2024-20373)

Vulnerability from cvelistv5 – Published: 2024-11-15 14:52 – Updated: 2024-11-15 16:20
VLAI?
Summary
A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.  This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials. SNMP with IPv6 ACL configurations is not affected. For more information, see the section of this advisory.
CWE
  • CWE-284 - Improper Access Control
Assigner
Impacted products
Vendor Product Version
Cisco Cisco IOS XE Catalyst SD-WAN Affected: 16.10.6
Affected: 16.12.3
Affected: 16.12.1
Affected: 16.10.4
Affected: 16.10.5
Affected: 16.12.4
Affected: 16.10.3
Affected: 16.10.3a
Affected: 16.10.3b
Affected: 16.11.1s
Affected: 16.11.1a
Affected: 16.10.1
Affected: 16.11.1f
Affected: 16.9.4
Affected: 16.9.3
Affected: 16.10.2
Affected: 16.11.1b
Affected: 16.11.1
Affected: 16.12.5
Affected: 16.11.1d
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3a:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3b:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1a:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1b:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1d:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1f:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1s:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.9.3:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ios_xe_catalyst_sd-wan",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "16.10.1"
              },
              {
                "status": "affected",
                "version": "16.10.2"
              },
              {
                "status": "affected",
                "version": "16.10.3"
              },
              {
                "status": "affected",
                "version": "16.10.3a"
              },
              {
                "status": "affected",
                "version": "16.10.3b"
              },
              {
                "status": "affected",
                "version": "16.10.4"
              },
              {
                "status": "affected",
                "version": "16.10.5"
              },
              {
                "status": "affected",
                "version": "16.10.6"
              },
              {
                "status": "affected",
                "version": "16.11.1"
              },
              {
                "status": "affected",
                "version": "16.11.1a"
              },
              {
                "status": "affected",
                "version": "16.11.1b"
              },
              {
                "status": "affected",
                "version": "16.11.1d"
              },
              {
                "status": "affected",
                "version": "16.11.1f"
              },
              {
                "status": "affected",
                "version": "16.11.1s"
              },
              {
                "status": "affected",
                "version": "16.12.1"
              },
              {
                "status": "affected",
                "version": "16.12.3"
              },
              {
                "status": "affected",
                "version": "16.12.4"
              },
              {
                "status": "affected",
                "version": "16.12.5"
              },
              {
                "status": "affected",
                "version": "16.9.3"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20373",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:20:19.710967Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:20:59.945Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.10.6"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.10.4"
            },
            {
              "status": "affected",
              "version": "16.10.5"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "16.10.3a"
            },
            {
              "status": "affected",
              "version": "16.10.3b"
            },
            {
              "status": "affected",
              "version": "16.11.1s"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.11.1f"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            },
            {
              "status": "affected",
              "version": "16.11.1d"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.\u0026nbsp;\r\n\r\nThis vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.\r\nSNMP with IPv6 ACL configurations is not affected.\r\nFor more information, see the  section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T14:52:34.137Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-snmp-uwBXfqww",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uwBXfqww"
        }
      ],
      "source": {
        "advisory": "cisco-sa-snmp-uwBXfqww",
        "defects": [
          "CSCwe24431"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS and Cisco IOS XE SNMP Extended ACL Bypass Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20373",
    "datePublished": "2024-11-15T14:52:34.137Z",
    "dateReserved": "2023-11-08T15:08:07.654Z",
    "dateUpdated": "2024-11-15T16:20:59.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20455 (GCVE-0-2024-20455)

Vulnerability from cvelistv5 – Published: 2024-09-25 16:18 – Updated: 2024-09-25 19:47
VLAI?
Summary
A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability.
CWE
Assigner
Impacted products
Vendor Product Version
Cisco Cisco IOS XE Software Affected: 17.1.1
Affected: 17.1.1a
Affected: 17.1.1s
Affected: 17.1.1t
Affected: 17.1.3
Affected: 17.2.1
Affected: 17.2.1r
Affected: 17.2.1a
Affected: 17.2.1v
Affected: 17.2.2
Affected: 17.2.3
Affected: 17.3.1
Affected: 17.3.2
Affected: 17.3.3
Affected: 17.3.1a
Affected: 17.3.1w
Affected: 17.3.2a
Affected: 17.3.1x
Affected: 17.3.1z
Affected: 17.3.4
Affected: 17.3.5
Affected: 17.3.4a
Affected: 17.3.6
Affected: 17.3.4b
Affected: 17.3.4c
Affected: 17.3.5a
Affected: 17.3.5b
Affected: 17.3.7
Affected: 17.3.8
Affected: 17.3.8a
Affected: 17.4.1
Affected: 17.4.2
Affected: 17.4.1a
Affected: 17.4.1b
Affected: 17.4.2a
Affected: 17.5.1
Affected: 17.5.1a
Affected: 17.6.1
Affected: 17.6.2
Affected: 17.6.1w
Affected: 17.6.1a
Affected: 17.6.1x
Affected: 17.6.3
Affected: 17.6.1y
Affected: 17.6.1z
Affected: 17.6.3a
Affected: 17.6.4
Affected: 17.6.1z1
Affected: 17.6.5
Affected: 17.6.6
Affected: 17.6.6a
Affected: 17.6.5a
Affected: 17.7.1
Affected: 17.7.1a
Affected: 17.7.1b
Affected: 17.7.2
Affected: 17.10.1
Affected: 17.10.1a
Affected: 17.10.1b
Affected: 17.8.1
Affected: 17.8.1a
Affected: 17.9.1
Affected: 17.9.1w
Affected: 17.9.2
Affected: 17.9.1a
Affected: 17.9.1x
Affected: 17.9.1y
Affected: 17.9.3
Affected: 17.9.2a
Affected: 17.9.1x1
Affected: 17.9.3a
Affected: 17.9.4
Affected: 17.9.1y1
Affected: 17.9.5
Affected: 17.9.4a
Affected: 17.9.5a
Affected: 17.9.5b
Affected: 17.11.1
Affected: 17.11.1a
Affected: 17.12.1
Affected: 17.12.1w
Affected: 17.12.1a
Affected: 17.12.2
Affected: 17.12.2a
Affected: 17.13.1
Affected: 17.13.1a
Affected: 17.11.99SW
Create a notification for this product.
    Cisco Cisco IOS XE Catalyst SD-WAN Affected: 17.5.1a
Affected: 17.6.1a
Affected: 17.6.2
Affected: 17.6.4
Affected: 17.7.1a
Affected: 17.9.1a
Affected: 17.9.2a
Affected: 17.9.3a
Affected: 17.9.4
Affected: 17.8.1a
Affected: 17.10.1a
Affected: 17.11.1a
Affected: 17.12.1a
Affected: 17.13.1a
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ios_xe",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "17.1.1"
              },
              {
                "status": "affected",
                "version": "17.1.1a"
              },
              {
                "status": "affected",
                "version": "17.1.1s"
              },
              {
                "status": "affected",
                "version": "17.1.1t"
              },
              {
                "status": "affected",
                "version": "17.1.3"
              },
              {
                "status": "affected",
                "version": "17.2.1"
              },
              {
                "status": "affected",
                "version": "17.2.1r"
              },
              {
                "status": "affected",
                "version": "17.2.1a"
              },
              {
                "status": "affected",
                "version": "17.2.1v"
              },
              {
                "status": "affected",
                "version": "17.2.2"
              },
              {
                "status": "affected",
                "version": "17.2.3"
              },
              {
                "status": "affected",
                "version": "17.3.1"
              },
              {
                "status": "affected",
                "version": "17.3.2"
              },
              {
                "status": "affected",
                "version": "17.3.3"
              },
              {
                "status": "affected",
                "version": "17.3.1a"
              },
              {
                "status": "affected",
                "version": "17.3.1w"
              },
              {
                "status": "affected",
                "version": "17.3.2a"
              },
              {
                "status": "affected",
                "version": "17.3.1x"
              },
              {
                "status": "affected",
                "version": "17.3.1z"
              },
              {
                "status": "affected",
                "version": "17.3.4"
              },
              {
                "status": "affected",
                "version": "17.3.5"
              },
              {
                "status": "affected",
                "version": "17.3.4a"
              },
              {
                "status": "affected",
                "version": "17.3.6"
              },
              {
                "status": "affected",
                "version": "17.3.4b"
              },
              {
                "status": "affected",
                "version": "17.3.4c"
              },
              {
                "status": "affected",
                "version": "17.3.5a"
              },
              {
                "status": "affected",
                "version": "17.3.5b"
              },
              {
                "status": "affected",
                "version": "17.3.7"
              },
              {
                "status": "affected",
                "version": "17.3.8"
              },
              {
                "status": "affected",
                "version": "17.3.8a"
              },
              {
                "status": "affected",
                "version": "17.4.1"
              },
              {
                "status": "affected",
                "version": "17.4.2"
              },
              {
                "status": "affected",
                "version": "17.4.1a"
              },
              {
                "status": "affected",
                "version": "17.4.1b"
              },
              {
                "status": "affected",
                "version": "17.4.2a"
              },
              {
                "status": "affected",
                "version": "17.5.1"
              },
              {
                "status": "affected",
                "version": "17.5.1a"
              },
              {
                "status": "affected",
                "version": "17.6.1"
              },
              {
                "status": "affected",
                "version": "17.6.2"
              },
              {
                "status": "affected",
                "version": "17.6.1w"
              },
              {
                "status": "affected",
                "version": "17.6.1a"
              },
              {
                "status": "affected",
                "version": "17.6.1x"
              },
              {
                "status": "affected",
                "version": "17.6.3"
              },
              {
                "status": "affected",
                "version": "17.6.1y"
              },
              {
                "status": "affected",
                "version": "17.6.1z"
              },
              {
                "status": "affected",
                "version": "17.6.3a"
              },
              {
                "status": "affected",
                "version": "17.6.4"
              },
              {
                "status": "affected",
                "version": "17.6.1z1"
              },
              {
                "status": "affected",
                "version": "17.6.5"
              },
              {
                "status": "affected",
                "version": "17.6.6"
              },
              {
                "status": "affected",
                "version": "17.6.6a"
              },
              {
                "status": "affected",
                "version": "17.6.5a"
              },
              {
                "status": "affected",
                "version": "17.7.1"
              },
              {
                "status": "affected",
                "version": "17.7.1a"
              },
              {
                "status": "affected",
                "version": "17.7.1b"
              },
              {
                "status": "affected",
                "version": "17.7.2"
              },
              {
                "status": "affected",
                "version": "17.10.1"
              },
              {
                "status": "affected",
                "version": "17.10.1a"
              },
              {
                "status": "affected",
                "version": "17.10.1b"
              },
              {
                "status": "affected",
                "version": "17.8.1"
              },
              {
                "status": "affected",
                "version": "17.8.1a"
              },
              {
                "status": "affected",
                "version": "17.9.1"
              },
              {
                "status": "affected",
                "version": "17.9.1w"
              },
              {
                "status": "affected",
                "version": "17.9.2"
              },
              {
                "status": "affected",
                "version": "17.9.1a"
              },
              {
                "status": "affected",
                "version": "17.9.1x"
              },
              {
                "status": "affected",
                "version": "17.9.1y"
              },
              {
                "status": "affected",
                "version": "17.9.3"
              },
              {
                "status": "affected",
                "version": "17.9.2a"
              },
              {
                "status": "affected",
                "version": "17.9.1x1"
              },
              {
                "status": "affected",
                "version": "17.9.3a"
              },
              {
                "status": "affected",
                "version": "17.9.4"
              },
              {
                "status": "affected",
                "version": "17.9.1y1"
              },
              {
                "status": "affected",
                "version": "17.9.5"
              },
              {
                "status": "affected",
                "version": "17.9.4a"
              },
              {
                "status": "affected",
                "version": "17.9.5a"
              },
              {
                "status": "affected",
                "version": "17.9.5b"
              },
              {
                "status": "affected",
                "version": "17.11.1"
              },
              {
                "status": "affected",
                "version": "17.11.1a"
              },
              {
                "status": "affected",
                "version": "17.12.1"
              },
              {
                "status": "affected",
                "version": "17.12.1w"
              },
              {
                "status": "affected",
                "version": "17.12.1a"
              },
              {
                "status": "affected",
                "version": "17.12.2"
              },
              {
                "status": "affected",
                "version": "17.12.2a"
              },
              {
                "status": "affected",
                "version": "17.13.1"
              },
              {
                "status": "affected",
                "version": "17.13.1a"
              },
              {
                "status": "affected",
                "version": "17.11.99sw"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ios_xe_catalyst_sd-wan",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "17.5.1a"
              },
              {
                "status": "affected",
                "version": "17.6.1a"
              },
              {
                "status": "affected",
                "version": "17.6.2"
              },
              {
                "status": "affected",
                "version": "17.6.4"
              },
              {
                "status": "affected",
                "version": "17.7.1a"
              },
              {
                "status": "affected",
                "version": "17.9.1a"
              },
              {
                "status": "affected",
                "version": "17.9.2a"
              },
              {
                "status": "affected",
                "version": "17.9.3a"
              },
              {
                "status": "affected",
                "version": "17.9.4"
              },
              {
                "status": "affected",
                "version": "17.8.1a"
              },
              {
                "status": "affected",
                "version": "17.10.1a"
              },
              {
                "status": "affected",
                "version": "17.11.1a"
              },
              {
                "status": "affected",
                "version": "17.12.1a"
              },
              {
                "status": "affected",
                "version": "17.13.1a"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20455",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T19:29:31.898015Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T19:47:05.368Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "17.1.1"
            },
            {
              "status": "affected",
              "version": "17.1.1a"
            },
            {
              "status": "affected",
              "version": "17.1.1s"
            },
            {
              "status": "affected",
              "version": "17.1.1t"
            },
            {
              "status": "affected",
              "version": "17.1.3"
            },
            {
              "status": "affected",
              "version": "17.2.1"
            },
            {
              "status": "affected",
              "version": "17.2.1r"
            },
            {
              "status": "affected",
              "version": "17.2.1a"
            },
            {
              "status": "affected",
              "version": "17.2.1v"
            },
            {
              "status": "affected",
              "version": "17.2.2"
            },
            {
              "status": "affected",
              "version": "17.2.3"
            },
            {
              "status": "affected",
              "version": "17.3.1"
            },
            {
              "status": "affected",
              "version": "17.3.2"
            },
            {
              "status": "affected",
              "version": "17.3.3"
            },
            {
              "status": "affected",
              "version": "17.3.1a"
            },
            {
              "status": "affected",
              "version": "17.3.1w"
            },
            {
              "status": "affected",
              "version": "17.3.2a"
            },
            {
              "status": "affected",
              "version": "17.3.1x"
            },
            {
              "status": "affected",
              "version": "17.3.1z"
            },
            {
              "status": "affected",
              "version": "17.3.4"
            },
            {
              "status": "affected",
              "version": "17.3.5"
            },
            {
              "status": "affected",
              "version": "17.3.4a"
            },
            {
              "status": "affected",
              "version": "17.3.6"
            },
            {
              "status": "affected",
              "version": "17.3.4b"
            },
            {
              "status": "affected",
              "version": "17.3.4c"
            },
            {
              "status": "affected",
              "version": "17.3.5a"
            },
            {
              "status": "affected",
              "version": "17.3.5b"
            },
            {
              "status": "affected",
              "version": "17.3.7"
            },
            {
              "status": "affected",
              "version": "17.3.8"
            },
            {
              "status": "affected",
              "version": "17.3.8a"
            },
            {
              "status": "affected",
              "version": "17.4.1"
            },
            {
              "status": "affected",
              "version": "17.4.2"
            },
            {
              "status": "affected",
              "version": "17.4.1a"
            },
            {
              "status": "affected",
              "version": "17.4.1b"
            },
            {
              "status": "affected",
              "version": "17.4.2a"
            },
            {
              "status": "affected",
              "version": "17.5.1"
            },
            {
              "status": "affected",
              "version": "17.5.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.1w"
            },
            {
              "status": "affected",
              "version": "17.6.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1x"
            },
            {
              "status": "affected",
              "version": "17.6.3"
            },
            {
              "status": "affected",
              "version": "17.6.1y"
            },
            {
              "status": "affected",
              "version": "17.6.1z"
            },
            {
              "status": "affected",
              "version": "17.6.3a"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.6.1z1"
            },
            {
              "status": "affected",
              "version": "17.6.5"
            },
            {
              "status": "affected",
              "version": "17.6.6"
            },
            {
              "status": "affected",
              "version": "17.6.6a"
            },
            {
              "status": "affected",
              "version": "17.6.5a"
            },
            {
              "status": "affected",
              "version": "17.7.1"
            },
            {
              "status": "affected",
              "version": "17.7.1a"
            },
            {
              "status": "affected",
              "version": "17.7.1b"
            },
            {
              "status": "affected",
              "version": "17.7.2"
            },
            {
              "status": "affected",
              "version": "17.10.1"
            },
            {
              "status": "affected",
              "version": "17.10.1a"
            },
            {
              "status": "affected",
              "version": "17.10.1b"
            },
            {
              "status": "affected",
              "version": "17.8.1"
            },
            {
              "status": "affected",
              "version": "17.8.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1"
            },
            {
              "status": "affected",
              "version": "17.9.1w"
            },
            {
              "status": "affected",
              "version": "17.9.2"
            },
            {
              "status": "affected",
              "version": "17.9.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1x"
            },
            {
              "status": "affected",
              "version": "17.9.1y"
            },
            {
              "status": "affected",
              "version": "17.9.3"
            },
            {
              "status": "affected",
              "version": "17.9.2a"
            },
            {
              "status": "affected",
              "version": "17.9.1x1"
            },
            {
              "status": "affected",
              "version": "17.9.3a"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.9.1y1"
            },
            {
              "status": "affected",
              "version": "17.9.5"
            },
            {
              "status": "affected",
              "version": "17.9.4a"
            },
            {
              "status": "affected",
              "version": "17.9.5a"
            },
            {
              "status": "affected",
              "version": "17.9.5b"
            },
            {
              "status": "affected",
              "version": "17.11.1"
            },
            {
              "status": "affected",
              "version": "17.11.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1"
            },
            {
              "status": "affected",
              "version": "17.12.1w"
            },
            {
              "status": "affected",
              "version": "17.12.1a"
            },
            {
              "status": "affected",
              "version": "17.12.2"
            },
            {
              "status": "affected",
              "version": "17.12.2a"
            },
            {
              "status": "affected",
              "version": "17.13.1"
            },
            {
              "status": "affected",
              "version": "17.13.1a"
            },
            {
              "status": "affected",
              "version": "17.11.99SW"
            }
          ]
        },
        {
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "17.5.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1a"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.7.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1a"
            },
            {
              "status": "affected",
              "version": "17.9.2a"
            },
            {
              "status": "affected",
              "version": "17.9.3a"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.8.1a"
            },
            {
              "status": "affected",
              "version": "17.10.1a"
            },
            {
              "status": "affected",
              "version": "17.11.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1a"
            },
            {
              "status": "affected",
              "version": "17.13.1a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-371",
              "description": "State Issues",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-25T16:27:24.944Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-sdwan-utd-dos-hDATqxs",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sdwan-utd-dos-hDATqxs",
        "defects": [
          "CSCwi07137"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20455",
    "datePublished": "2024-09-25T16:18:50.066Z",
    "dateReserved": "2023-11-08T15:08:07.679Z",
    "dateUpdated": "2024-09-25T19:47:05.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20035 (GCVE-0-2023-20035)

Vulnerability from cvelistv5 – Published: 2023-03-23 00:00 – Updated: 2024-10-28 16:32
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20230322 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20035",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-28T16:19:23.522101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T16:32:57.941Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software ",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2023-03-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-146",
              "description": "CWE-146",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-23T00:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20230322 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ios-xe-sdwan-VQAhEjYw",
        "defect": [
          [
            "CSCvx72976",
            "CSCwc41942"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20035",
    "datePublished": "2023-03-23T00:00:00",
    "dateReserved": "2022-10-27T00:00:00",
    "dateUpdated": "2024-10-28T16:32:57.941Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20850 (GCVE-0-2022-20850)

Vulnerability from cvelistv5 – Published: 2022-09-30 18:46 – Updated: 2024-11-01 18:50
VLAI?
Summary
A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:50.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220928 Cisco SD-WAN Arbitrary File Deletion Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20850",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-01T18:40:31.320155Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-01T18:50:42.028Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco SD-WAN Solution",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-09-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-30T18:46:05",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220928 Cisco SD-WAN Arbitrary File Deletion Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
        }
      ],
      "source": {
        "advisory": "cisco-sa-arb-file-delete-VB2rVcQv",
        "defect": [
          [
            "CSCvm25943"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco SD-WAN Arbitrary File Deletion Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-09-28T16:00:00",
          "ID": "CVE-2022-20850",
          "STATE": "PUBLIC",
          "TITLE": "Cisco SD-WAN Arbitrary File Deletion Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco SD-WAN Solution",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.5",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-22"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220928 Cisco SD-WAN Arbitrary File Deletion Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-arb-file-delete-VB2rVcQv",
          "defect": [
            [
              "CSCvm25943"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20850",
    "datePublished": "2022-09-30T18:46:05.246074Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-01T18:50:42.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1529 (GCVE-0-2021-1529)

Vulnerability from cvelistv5 – Published: 2021-10-21 02:45 – Updated: 2024-11-07 21:47
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:17.673Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20211020 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1529",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:42:50.706618Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T21:47:38.698Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE SD-WAN Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-10-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-21T02:45:10",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20211020 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sd-wan-rhpbE34A",
        "defect": [
          [
            "CSCvx50713"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-10-20T16:00:00",
          "ID": "CVE-2021-1529",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE SD-WAN Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20211020 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-sd-wan-rhpbE34A",
          "defect": [
            [
              "CSCvx50713"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1529",
    "datePublished": "2021-10-21T02:45:10.183174Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T21:47:38.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1619 (GCVE-0-2021-1619)

Vulnerability from cvelistv5 – Published: 2021-09-23 02:30 – Updated: 2024-11-07 21:57
VLAI?
Summary
A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:18:11.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1619",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:55:52.696954Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T21:57:46.001Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-09-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-824",
              "description": "CWE-824",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-23T02:30:55",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
        }
      ],
      "source": {
        "advisory": "cisco-sa-aaa-Yx47ZT8Q",
        "defect": [
          [
            "CSCvt53563"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-09-22T16:00:00",
          "ID": "CVE-2021-1619",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "9.8",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-824"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-aaa-Yx47ZT8Q",
          "defect": [
            [
              "CSCvt53563"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1619",
    "datePublished": "2021-09-23T02:30:56.078204Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T21:57:46.001Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34729 (GCVE-0-2021-34729)

Vulnerability from cvelistv5 – Published: 2021-09-23 02:26 – Updated: 2024-11-07 21:58
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:19:48.140Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210922 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34729",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:43:01.874543Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T21:58:26.237Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE SD-WAN Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-09-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-23T02:26:36",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210922 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ioxesdwan-clicmdinj-7bYX5k3",
        "defect": [
          [
            "CSCvw54120"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-09-22T16:00:00",
          "ID": "CVE-2021-34729",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE SD-WAN Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.7",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210922 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-ioxesdwan-clicmdinj-7bYX5k3",
          "defect": [
            [
              "CSCvw54120"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-34729",
    "datePublished": "2021-09-23T02:26:36.609998Z",
    "dateReserved": "2021-06-15T00:00:00",
    "dateUpdated": "2024-11-07T21:58:26.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20352 (GCVE-0-2025-20352)

Vulnerability from nvd – Published: 2025-09-24 17:10 – Updated: 2025-10-21 22:45
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. Note: This vulnerability affects all versions of SNMP.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Cisco IOS Affected: 12.2(55)SE
Affected: 12.2(55)SE3
Affected: 12.2(55)SE2
Affected: 12.2(58)SE
Affected: 12.2(55)SE1
Affected: 12.2(58)SE1
Affected: 12.2(55)SE4
Affected: 12.2(58)SE2
Affected: 12.2(55)SE5
Affected: 12.2(55)SE6
Affected: 12.2(55)SE7
Affected: 12.2(55)SE8
Affected: 12.2(55)SE9
Affected: 12.2(55)SE10
Affected: 12.2(55)SE11
Affected: 12.2(55)SE12
Affected: 12.2(55)SE13
Affected: 12.2(58)EZ
Affected: 12.2(53)EZ
Affected: 12.2(55)EZ
Affected: 12.2(60)EZ
Affected: 12.2(60)EZ1
Affected: 12.2(60)EZ2
Affected: 12.2(60)EZ3
Affected: 12.2(60)EZ4
Affected: 12.2(60)EZ5
Affected: 12.2(60)EZ6
Affected: 12.2(60)EZ7
Affected: 12.2(60)EZ8
Affected: 12.2(60)EZ9
Affected: 12.2(60)EZ10
Affected: 12.2(60)EZ11
Affected: 12.2(60)EZ12
Affected: 12.2(60)EZ13
Affected: 12.2(60)EZ14
Affected: 12.2(60)EZ15
Affected: 12.2(33)SXI2
Affected: 12.2(33)SXI3
Affected: 12.2(33)SXI5
Affected: 12.2(33)SXI4a
Affected: 12.2(33)SXI4
Affected: 12.2(33)SXI2a
Affected: 12.2(33)SXI
Affected: 12.2(33)SXI6
Affected: 12.2(33)SXI7
Affected: 12.2(33)SXI1
Affected: 12.2(33)SXI8
Affected: 12.2(33)SXI9
Affected: 12.2(33)SXI8a
Affected: 12.2(33)SXI10
Affected: 12.2(33)SXI11
Affected: 12.2(33)SXI12
Affected: 12.2(33)SXI13
Affected: 12.2(33)SXI14
Affected: 12.2(50)SQ2
Affected: 12.2(50)SQ1
Affected: 12.2(50)SQ
Affected: 12.2(50)SQ3
Affected: 12.2(50)SQ4
Affected: 12.2(50)SQ5
Affected: 12.2(50)SQ6
Affected: 12.2(50)SQ7
Affected: 15.3(1)T
Affected: 15.3(2)T
Affected: 15.3(1)T1
Affected: 15.3(1)T2
Affected: 15.3(1)T3
Affected: 15.3(1)T4
Affected: 15.3(2)T1
Affected: 15.3(2)T2
Affected: 15.3(2)T3
Affected: 15.3(2)T4
Affected: 15.0(1)EY
Affected: 15.0(1)EY1
Affected: 15.0(1)EY2
Affected: 15.0(2)EY
Affected: 15.0(2)EY1
Affected: 15.0(2)EY2
Affected: 15.0(2)EY3
Affected: 15.0(1)SE
Affected: 15.0(2)SE
Affected: 15.0(1)SE1
Affected: 15.0(1)SE2
Affected: 15.0(1)SE3
Affected: 15.0(2)SE1
Affected: 15.0(2)SE2
Affected: 15.0(2)SE3
Affected: 15.0(2)SE4
Affected: 15.0(2)SE5
Affected: 15.0(2)SE6
Affected: 15.0(2)SE7
Affected: 15.0(2)SE8
Affected: 15.0(2)SE9
Affected: 15.0(2)SE10
Affected: 15.0(2)SE11
Affected: 15.0(2)SE10a
Affected: 15.0(2)SE12
Affected: 15.0(2)SE13
Affected: 15.0(1)SY
Affected: 15.0(1)SY1
Affected: 15.0(1)SY2
Affected: 15.0(1)SY3
Affected: 15.0(1)SY4
Affected: 15.0(1)SY5
Affected: 15.0(1)SY6
Affected: 15.0(1)SY7
Affected: 15.0(1)SY8
Affected: 15.0(1)SY7a
Affected: 15.0(1)SY9
Affected: 15.0(1)SY10
Affected: 12.2(33)SXJ
Affected: 12.2(33)SXJ1
Affected: 12.2(33)SXJ2
Affected: 12.2(33)SXJ3
Affected: 12.2(33)SXJ4
Affected: 12.2(33)SXJ5
Affected: 12.2(33)SXJ6
Affected: 12.2(33)SXJ7
Affected: 12.2(33)SXJ8
Affected: 12.2(33)SXJ9
Affected: 12.2(33)SXJ10
Affected: 15.1(1)SG
Affected: 15.1(2)SG
Affected: 15.1(1)SG1
Affected: 15.1(1)SG2
Affected: 15.1(2)SG1
Affected: 15.1(2)SG2
Affected: 15.1(2)SG3
Affected: 15.1(2)SG4
Affected: 15.1(2)SG5
Affected: 15.1(2)SG6
Affected: 15.1(2)SG7
Affected: 15.1(2)SG8
Affected: 15.2(4)M
Affected: 15.2(4)M1
Affected: 15.2(4)M2
Affected: 15.2(4)M4
Affected: 15.2(4)M3
Affected: 15.2(4)M5
Affected: 15.2(4)M8
Affected: 15.2(4)M10
Affected: 15.2(4)M7
Affected: 15.2(4)M6
Affected: 15.2(4)M9
Affected: 15.2(4)M6a
Affected: 15.2(4)M11
Affected: 15.0(2)SG
Affected: 15.0(2)SG1
Affected: 15.0(2)SG2
Affected: 15.0(2)SG3
Affected: 15.0(2)SG4
Affected: 15.0(2)SG5
Affected: 15.0(2)SG6
Affected: 15.0(2)SG7
Affected: 15.0(2)SG8
Affected: 15.0(2)SG9
Affected: 15.0(2)SG10
Affected: 15.0(2)SG11
Affected: 15.2(2)GC
Affected: 15.2(3)GC
Affected: 15.2(3)GC1
Affected: 15.2(4)GC
Affected: 15.2(4)GC1
Affected: 15.2(4)GC2
Affected: 15.2(4)GC3
Affected: 15.1(1)SY
Affected: 15.1(1)SY1
Affected: 15.1(2)SY
Affected: 15.1(2)SY1
Affected: 15.1(2)SY2
Affected: 15.1(1)SY2
Affected: 15.1(1)SY3
Affected: 15.1(2)SY3
Affected: 15.1(1)SY4
Affected: 15.1(2)SY4
Affected: 15.1(1)SY5
Affected: 15.1(2)SY5
Affected: 15.1(2)SY4a
Affected: 15.1(1)SY6
Affected: 15.1(2)SY6
Affected: 15.1(2)SY7
Affected: 15.1(2)SY8
Affected: 15.1(2)SY9
Affected: 15.1(2)SY10
Affected: 15.1(2)SY11
Affected: 15.1(2)SY12
Affected: 15.1(2)SY13
Affected: 15.1(2)SY14
Affected: 15.1(2)SY15
Affected: 15.1(2)SY16
Affected: 15.4(1)T
Affected: 15.4(2)T
Affected: 15.4(1)T2
Affected: 15.4(1)T1
Affected: 15.4(1)T3
Affected: 15.4(2)T1
Affected: 15.4(2)T3
Affected: 15.4(2)T2
Affected: 15.4(1)T4
Affected: 15.4(2)T4
Affected: 15.0(2)EA
Affected: 15.0(2)EA1
Affected: 15.2(1)E
Affected: 15.2(2)E
Affected: 15.2(1)E1
Affected: 15.2(3)E
Affected: 15.2(1)E2
Affected: 15.2(1)E3
Affected: 15.2(2)E1
Affected: 15.2(4)E
Affected: 15.2(3)E1
Affected: 15.2(2)E2
Affected: 15.2(2a)E1
Affected: 15.2(2)E3
Affected: 15.2(2a)E2
Affected: 15.2(3)E2
Affected: 15.2(3a)E
Affected: 15.2(3)E3
Affected: 15.2(4)E1
Affected: 15.2(2)E4
Affected: 15.2(2)E5
Affected: 15.2(4)E2
Affected: 15.2(3)E4
Affected: 15.2(5)E
Affected: 15.2(4)E3
Affected: 15.2(2)E6
Affected: 15.2(5a)E
Affected: 15.2(5)E1
Affected: 15.2(5b)E
Affected: 15.2(2)E5a
Affected: 15.2(5c)E
Affected: 15.2(2)E5b
Affected: 15.2(5a)E1
Affected: 15.2(4)E4
Affected: 15.2(2)E7
Affected: 15.2(5)E2
Affected: 15.2(6)E
Affected: 15.2(4)E5
Affected: 15.2(5)E2c
Affected: 15.2(2)E8
Affected: 15.2(6)E0a
Affected: 15.2(6)E1
Affected: 15.2(6)E0c
Affected: 15.2(4)E6
Affected: 15.2(6)E2
Affected: 15.2(2)E9
Affected: 15.2(4)E7
Affected: 15.2(7)E
Affected: 15.2(2)E10
Affected: 15.2(4)E8
Affected: 15.2(6)E2a
Affected: 15.2(6)E2b
Affected: 15.2(7)E1
Affected: 15.2(7)E0a
Affected: 15.2(7)E0b
Affected: 15.2(7)E0s
Affected: 15.2(6)E3
Affected: 15.2(4)E9
Affected: 15.2(7)E2
Affected: 15.2(7a)E0b
Affected: 15.2(4)E10
Affected: 15.2(7)E3
Affected: 15.2(7)E1a
Affected: 15.2(7b)E0b
Affected: 15.2(7)E2a
Affected: 15.2(4)E10a
Affected: 15.2(7)E4
Affected: 15.2(7)E3k
Affected: 15.2(8)E
Affected: 15.2(8)E1
Affected: 15.2(7)E5
Affected: 15.2(7)E6
Affected: 15.2(8)E2
Affected: 15.2(4)E10d
Affected: 15.2(7)E7
Affected: 15.2(8)E3
Affected: 15.2(7)E8
Affected: 15.2(8)E4
Affected: 15.2(7)E9
Affected: 15.2(8)E5
Affected: 15.2(8)E6
Affected: 15.2(7)E10
Affected: 15.2(7)E11
Affected: 15.2(8)E7
Affected: 15.2(7)E12
Affected: 15.2(2)JB
Affected: 15.2(2)JB2
Affected: 15.2(4)JB
Affected: 15.2(2)JB3
Affected: 15.2(4)JB1
Affected: 15.2(4)JB2
Affected: 15.2(4)JB3
Affected: 15.2(4)JB3a
Affected: 15.2(2)JB4
Affected: 15.2(4)JB4
Affected: 15.2(4)JB3h
Affected: 15.2(4)JB3b
Affected: 15.2(4)JB5
Affected: 15.2(4)JB6
Affected: 15.2(2)JB5
Affected: 15.2(2)JB6
Affected: 15.2(2)JAX
Affected: 15.3(3)M
Affected: 15.3(3)M1
Affected: 15.3(3)M2
Affected: 15.3(3)M3
Affected: 15.3(3)M5
Affected: 15.3(3)M4
Affected: 15.3(3)M6
Affected: 15.3(3)M7
Affected: 15.3(3)M8
Affected: 15.3(3)M9
Affected: 15.3(3)M10
Affected: 15.3(3)M8a
Affected: 15.2(4)JN
Affected: 15.2(1)EY
Affected: 15.0(2)EJ
Affected: 15.0(2)EJ1
Affected: 15.2(1)SY
Affected: 15.2(1)SY1
Affected: 15.2(1)SY0a
Affected: 15.2(1)SY2
Affected: 15.2(2)SY
Affected: 15.2(1)SY1a
Affected: 15.2(2)SY1
Affected: 15.2(2)SY2
Affected: 15.2(1)SY3
Affected: 15.2(1)SY4
Affected: 15.2(2)SY3
Affected: 15.2(1)SY5
Affected: 15.2(1)SY6
Affected: 15.2(1)SY7
Affected: 15.2(1)SY8
Affected: 15.2(5)EX
Affected: 15.0(2)EK
Affected: 15.0(2)EK1
Affected: 15.4(1)CG
Affected: 15.4(1)CG1
Affected: 15.4(2)CG
Affected: 15.5(1)S
Affected: 15.5(2)S
Affected: 15.5(1)S1
Affected: 15.5(3)S
Affected: 15.5(1)S2
Affected: 15.5(1)S3
Affected: 15.5(2)S1
Affected: 15.5(2)S2
Affected: 15.5(3)S1
Affected: 15.5(3)S1a
Affected: 15.5(2)S3
Affected: 15.5(3)S2
Affected: 15.5(3)S0a
Affected: 15.5(3)S3
Affected: 15.5(1)S4
Affected: 15.5(2)S4
Affected: 15.5(3)S4
Affected: 15.5(3)S5
Affected: 15.5(3)S6
Affected: 15.5(3)S6a
Affected: 15.5(3)S7
Affected: 15.5(3)S6b
Affected: 15.5(3)S8
Affected: 15.5(3)S9
Affected: 15.5(3)S10
Affected: 15.5(3)S9a
Affected: 15.5(1)T
Affected: 15.5(1)T1
Affected: 15.5(2)T
Affected: 15.5(1)T2
Affected: 15.5(1)T3
Affected: 15.5(2)T1
Affected: 15.5(2)T2
Affected: 15.5(2)T3
Affected: 15.5(2)T4
Affected: 15.5(1)T4
Affected: 15.2(2)EA
Affected: 15.2(2)EA1
Affected: 15.2(2)EA2
Affected: 15.2(3)EA
Affected: 15.2(4)EA
Affected: 15.2(4)EA1
Affected: 15.2(2)EA3
Affected: 15.2(4)EA3
Affected: 15.2(5)EA
Affected: 15.2(4)EA4
Affected: 15.2(4)EA5
Affected: 15.2(4)EA6
Affected: 15.2(4)EA7
Affected: 15.2(4)EA8
Affected: 15.2(4)EA9
Affected: 15.2(4)EA9a
Affected: 15.3(3)JN3
Affected: 15.3(3)JN4
Affected: 15.3(3)JN7
Affected: 15.3(3)JN8
Affected: 15.3(3)JN9
Affected: 15.5(3)M
Affected: 15.5(3)M1
Affected: 15.5(3)M0a
Affected: 15.5(3)M2
Affected: 15.5(3)M3
Affected: 15.5(3)M4
Affected: 15.5(3)M4a
Affected: 15.5(3)M5
Affected: 15.5(3)M6
Affected: 15.5(3)M7
Affected: 15.5(3)M6a
Affected: 15.5(3)M8
Affected: 15.5(3)M9
Affected: 15.5(3)M10
Affected: 15.3(3)JA1m
Affected: 15.3(3)JA1
Affected: 15.3(3)JA4
Affected: 15.3(3)JA5
Affected: 15.3(3)JA6
Affected: 15.3(3)JA7
Affected: 15.3(3)JA8
Affected: 15.3(3)JA10
Affected: 15.3(3)JA11
Affected: 15.3(3)JA12
Affected: 15.3(3)JAA
Affected: 15.3(3)JAA11
Affected: 15.3(3)JAA12
Affected: 15.3(3)JAB
Affected: 15.3(3)JB
Affected: 15.5(3)SN
Affected: 15.0(2)SQD
Affected: 15.0(2)SQD1
Affected: 15.0(2)SQD2
Affected: 15.0(2)SQD3
Affected: 15.0(2)SQD4
Affected: 15.0(2)SQD5
Affected: 15.0(2)SQD6
Affected: 15.0(2)SQD7
Affected: 15.0(2)SQD8
Affected: 15.6(1)S
Affected: 15.6(2)S
Affected: 15.6(2)S1
Affected: 15.6(1)S1
Affected: 15.6(1)S2
Affected: 15.6(2)S2
Affected: 15.6(1)S3
Affected: 15.6(2)S3
Affected: 15.6(1)S4
Affected: 15.6(2)S4
Affected: 15.6(1)T
Affected: 15.6(2)T
Affected: 15.6(1)T0a
Affected: 15.6(1)T1
Affected: 15.6(2)T1
Affected: 15.6(1)T2
Affected: 15.6(2)T2
Affected: 15.6(1)T3
Affected: 15.6(2)T3
Affected: 15.3(3)JNB
Affected: 15.3(3)JNB1
Affected: 15.3(3)JNB2
Affected: 15.3(3)JNB3
Affected: 15.3(3)JNB4
Affected: 15.3(3)JNB6
Affected: 15.3(3)JNB5
Affected: 15.3(3)JAX
Affected: 15.3(3)JAX1
Affected: 15.3(3)JAX2
Affected: 15.3(3)JBB
Affected: 15.3(3)JBB1
Affected: 15.3(3)JBB2
Affected: 15.3(3)JBB4
Affected: 15.3(3)JBB5
Affected: 15.3(3)JBB6
Affected: 15.3(3)JBB8
Affected: 15.3(3)JBB6a
Affected: 15.3(3)JC
Affected: 15.3(3)JC1
Affected: 15.3(3)JC2
Affected: 15.3(3)JC3
Affected: 15.3(3)JC4
Affected: 15.3(3)JC5
Affected: 15.3(3)JC6
Affected: 15.3(3)JC8
Affected: 15.3(3)JC9
Affected: 15.3(3)JC14
Affected: 15.3(1)SY
Affected: 15.3(1)SY1
Affected: 15.3(1)SY2
Affected: 15.3(3)JNC
Affected: 15.3(3)JNC1
Affected: 15.3(3)JNC4
Affected: 15.3(3)JNP
Affected: 15.3(3)JNP1
Affected: 15.3(3)JNP3
Affected: 15.6(2)SP
Affected: 15.6(2)SP1
Affected: 15.6(2)SP2
Affected: 15.6(2)SP3
Affected: 15.6(2)SP4
Affected: 15.6(2)SP5
Affected: 15.6(2)SP6
Affected: 15.6(2)SP7
Affected: 15.6(2)SP8
Affected: 15.6(2)SP9
Affected: 15.6(2)SN
Affected: 15.3(3)JPB
Affected: 15.3(3)JPB1
Affected: 15.3(3)JD
Affected: 15.3(3)JD2
Affected: 15.3(3)JD3
Affected: 15.3(3)JD4
Affected: 15.3(3)JD5
Affected: 15.3(3)JD6
Affected: 15.3(3)JD7
Affected: 15.3(3)JD8
Affected: 15.3(3)JD9
Affected: 15.3(3)JD11
Affected: 15.3(3)JD13
Affected: 15.3(3)JD14
Affected: 15.3(3)JD16
Affected: 15.3(3)JD17
Affected: 15.6(3)M
Affected: 15.6(3)M1
Affected: 15.6(3)M0a
Affected: 15.6(3)M1b
Affected: 15.6(3)M2
Affected: 15.6(3)M2a
Affected: 15.6(3)M3
Affected: 15.6(3)M3a
Affected: 15.6(3)M4
Affected: 15.6(3)M5
Affected: 15.6(3)M6
Affected: 15.6(3)M7
Affected: 15.6(3)M6a
Affected: 15.6(3)M6b
Affected: 15.6(3)M8
Affected: 15.6(3)M9
Affected: 15.2(4)EC1
Affected: 15.2(4)EC2
Affected: 15.3(3)JPC
Affected: 15.3(3)JPC1
Affected: 15.3(3)JPC2
Affected: 15.3(3)JPC3
Affected: 15.3(3)JPC5
Affected: 15.3(3)JND
Affected: 15.3(3)JND1
Affected: 15.3(3)JND2
Affected: 15.3(3)JND3
Affected: 15.4(1)SY
Affected: 15.4(1)SY1
Affected: 15.4(1)SY2
Affected: 15.4(1)SY3
Affected: 15.4(1)SY4
Affected: 15.3(3)JE
Affected: 15.3(3)JPD
Affected: 15.3(3)JDA7
Affected: 15.3(3)JDA8
Affected: 15.3(3)JDA9
Affected: 15.3(3)JDA11
Affected: 15.3(3)JDA13
Affected: 15.3(3)JDA14
Affected: 15.3(3)JDA16
Affected: 15.3(3)JDA17
Affected: 15.5(1)SY
Affected: 15.5(1)SY1
Affected: 15.5(1)SY2
Affected: 15.5(1)SY3
Affected: 15.5(1)SY4
Affected: 15.5(1)SY5
Affected: 15.5(1)SY6
Affected: 15.5(1)SY7
Affected: 15.5(1)SY8
Affected: 15.5(1)SY9
Affected: 15.5(1)SY10
Affected: 15.5(1)SY11
Affected: 15.5(1)SY12
Affected: 15.5(1)SY13
Affected: 15.5(1)SY14
Affected: 15.5(1)SY15
Affected: 15.3(3)JF
Affected: 15.3(3)JF1
Affected: 15.3(3)JF2
Affected: 15.3(3)JF4
Affected: 15.3(3)JF5
Affected: 15.3(3)JF6
Affected: 15.3(3)JF7
Affected: 15.3(3)JF8
Affected: 15.3(3)JF9
Affected: 15.3(3)JF10
Affected: 15.3(3)JF11
Affected: 15.3(3)JF12
Affected: 15.3(3)JF12i
Affected: 15.3(3)JF14
Affected: 15.3(3)JF14i
Affected: 15.3(3)JF15
Affected: 15.3(3)JCA7
Affected: 15.3(3)JCA8
Affected: 15.3(3)JCA9
Affected: 15.7(3)M
Affected: 15.7(3)M1
Affected: 15.7(3)M0a
Affected: 15.7(3)M3
Affected: 15.7(3)M2
Affected: 15.7(3)M4
Affected: 15.7(3)M5
Affected: 15.7(3)M4a
Affected: 15.7(3)M4b
Affected: 15.7(3)M6
Affected: 15.7(3)M7
Affected: 15.7(3)M8
Affected: 15.7(3)M9
Affected: 15.3(3)JG
Affected: 15.3(3)JG1
Affected: 15.3(3)JH
Affected: 15.3(3)JH1
Affected: 15.3(3)JI1
Affected: 15.3(3)JI3
Affected: 15.3(3)JI4
Affected: 15.3(3)JI5
Affected: 15.3(3)JI6
Affected: 15.8(3)M
Affected: 15.8(3)M1
Affected: 15.8(3)M0a
Affected: 15.8(3)M0b
Affected: 15.8(3)M2
Affected: 15.8(3)M1a
Affected: 15.8(3)M3
Affected: 15.8(3)M2a
Affected: 15.8(3)M4
Affected: 15.8(3)M3a
Affected: 15.8(3)M3b
Affected: 15.8(3)M5
Affected: 15.8(3)M6
Affected: 15.8(3)M7
Affected: 15.8(3)M8
Affected: 15.8(3)M9
Affected: 15.9(3)M
Affected: 15.9(3)M1
Affected: 15.9(3)M0a
Affected: 15.9(3)M2
Affected: 15.9(3)M3
Affected: 15.9(3)M2a
Affected: 15.9(3)M3a
Affected: 15.9(3)M4
Affected: 15.9(3)M3b
Affected: 15.9(3)M5
Affected: 15.9(3)M4a
Affected: 15.9(3)M6
Affected: 15.9(3)M7
Affected: 15.9(3)M6a
Affected: 15.9(3)M6b
Affected: 15.9(3)M8
Affected: 15.9(3)M7a
Affected: 15.9(3)M9
Affected: 15.9(3)M8b
Affected: 15.9(3)M10
Affected: 15.9(3)M11
Affected: 15.3(3)JK
Affected: 15.3(3)JK1
Affected: 15.3(3)JK2
Affected: 15.3(3)JK3
Affected: 15.3(3)JK2a
Affected: 15.3(3)JK1t
Affected: 15.3(3)JK4
Affected: 15.3(3)JK5
Affected: 15.3(3)JK6
Affected: 15.3(3)JK7
Affected: 15.3(3)JK8
Affected: 15.3(3)JK8a
Affected: 15.3(3)JK8b
Affected: 15.3(3)JK9
Affected: 15.3(3)JK10
Affected: 15.3(3)JK11
Affected: 15.3(3)JJ
Affected: 15.3(3)JJ1
Affected: 15.3(3)JPI1
Affected: 15.3(3)JPI4
Affected: 15.3(3)JPI1t
Affected: 15.3(3)JPI5
Affected: 15.3(3)JPI7
Affected: 15.3(3)JPI6a
Affected: 15.3(3)JPI8a
Affected: 15.3(3)JPI9
Affected: 15.3(3)JPI10
Affected: 15.3(3)JPJ2
Affected: 15.3(3)JPJ3
Affected: 15.3(3)JPJ2t
Affected: 15.3(3)JPJ3a
Affected: 15.3(3)JPJ4
Affected: 15.3(3)JPJ5
Affected: 15.3(3)JPJ6
Affected: 15.3(3)JPJ7
Affected: 15.3(3)JPJ7c
Affected: 15.3(3)JPJ8a
Affected: 15.3(3)JPJ9
Affected: 15.3(3)JPJ10
Affected: 15.3(3)JPJ11
Affected: 15.3(3)JPK
Affected: 15.3(3)JPK1
Affected: 15.3(3)JPK2
Affected: 15.3(3)JPK3
Affected: 15.3(3)JPK4
Affected: 15.3(3)JPK5
Affected: 15.3(3)JPK6
Affected: 15.3(3)JPK7
Affected: 15.3(3)JPK8
Affected: 15.3(3)JPK9
Affected: 15.3(3)JPL
Affected: 15.3(3)JPM
Affected: 15.3(3)JPN
Affected: 15.3(3)JPN1
Affected: 15.3(3)JPN2
Affected: 15.3(3)JPN3
Affected: 15.3(3)JPN4
Affected: 15.3(3)JPN5
Affected: 15.3(3)JPN6
Affected: 15.3(3)JPO
Affected: 15.3(3)JPP
Affected: 15.3(3)JPQ
Affected: 15.3(3)JPQ1
Affected: 15.3(3)JPQ2
Affected: 15.3(3)JPQ3
Affected: 15.3(3)JPQ4
Affected: 15.3(3)JPQ5
Affected: 15.3(3)JPR
Affected: 15.3(3)JPS
Affected: 15.3(3)JPT
Affected: 15.3(3)JPT1
Affected: 15.3(3)JPT2
Create a notification for this product.
    Cisco Cisco IOS XE Software Affected: 3.5.0E
Affected: 3.5.1E
Affected: 3.5.2E
Affected: 3.5.3E
Affected: 3.6.0E
Affected: 3.6.1E
Affected: 3.6.2aE
Affected: 3.6.2E
Affected: 3.6.3E
Affected: 3.6.4E
Affected: 3.6.5E
Affected: 3.6.6E
Affected: 3.6.5aE
Affected: 3.6.7E
Affected: 3.6.8E
Affected: 3.6.7bE
Affected: 3.6.9E
Affected: 3.6.10E
Affected: 3.14.0S
Affected: 3.14.1S
Affected: 3.14.2S
Affected: 3.14.3S
Affected: 3.14.4S
Affected: 3.15.0S
Affected: 3.15.1S
Affected: 3.15.2S
Affected: 3.15.1cS
Affected: 3.15.3S
Affected: 3.15.4S
Affected: 3.7.0E
Affected: 3.7.1E
Affected: 3.7.2E
Affected: 3.7.3E
Affected: 3.7.4E
Affected: 3.7.5E
Affected: 3.5.0SQ
Affected: 3.5.1SQ
Affected: 3.5.2SQ
Affected: 3.5.3SQ
Affected: 3.5.4SQ
Affected: 3.5.5SQ
Affected: 3.5.6SQ
Affected: 3.5.7SQ
Affected: 3.5.8SQ
Affected: 3.16.0S
Affected: 3.16.1S
Affected: 3.16.1aS
Affected: 3.16.2S
Affected: 3.16.2aS
Affected: 3.16.0cS
Affected: 3.16.3S
Affected: 3.16.2bS
Affected: 3.16.3aS
Affected: 3.16.4S
Affected: 3.16.4aS
Affected: 3.16.4bS
Affected: 3.16.5S
Affected: 3.16.4dS
Affected: 3.16.6S
Affected: 3.16.7S
Affected: 3.16.6bS
Affected: 3.16.7aS
Affected: 3.16.7bS
Affected: 3.16.8S
Affected: 3.16.9S
Affected: 3.16.10S
Affected: 3.17.0S
Affected: 3.17.1S
Affected: 3.17.2S
Affected: 3.17.1aS
Affected: 3.17.3S
Affected: 3.17.4S
Affected: 3.8.0E
Affected: 3.8.1E
Affected: 3.8.2E
Affected: 3.8.3E
Affected: 3.8.4E
Affected: 3.8.5E
Affected: 3.8.5aE
Affected: 3.8.6E
Affected: 3.8.7E
Affected: 3.8.8E
Affected: 3.8.9E
Affected: 3.8.10E
Affected: 3.18.0aS
Affected: 3.18.0S
Affected: 3.18.1S
Affected: 3.18.2S
Affected: 3.18.3S
Affected: 3.18.4S
Affected: 3.18.0SP
Affected: 3.18.1SP
Affected: 3.18.1aSP
Affected: 3.18.1bSP
Affected: 3.18.1cSP
Affected: 3.18.2SP
Affected: 3.18.2aSP
Affected: 3.18.3SP
Affected: 3.18.4SP
Affected: 3.18.3aSP
Affected: 3.18.3bSP
Affected: 3.18.5SP
Affected: 3.18.6SP
Affected: 3.18.7SP
Affected: 3.18.8aSP
Affected: 3.18.9SP
Affected: 3.9.0E
Affected: 3.9.1E
Affected: 3.9.2E
Affected: 16.6.1
Affected: 16.6.2
Affected: 16.6.3
Affected: 16.6.4
Affected: 16.6.5
Affected: 16.6.4a
Affected: 16.6.5a
Affected: 16.6.6
Affected: 16.6.7
Affected: 16.6.8
Affected: 16.6.9
Affected: 16.6.10
Affected: 16.7.1
Affected: 16.7.1a
Affected: 16.7.1b
Affected: 16.7.2
Affected: 16.7.3
Affected: 16.7.4
Affected: 16.8.1
Affected: 16.8.1a
Affected: 16.8.1b
Affected: 16.8.1s
Affected: 16.8.1c
Affected: 16.8.1d
Affected: 16.8.2
Affected: 16.8.1e
Affected: 16.8.3
Affected: 16.9.1
Affected: 16.9.2
Affected: 16.9.1a
Affected: 16.9.1b
Affected: 16.9.1s
Affected: 16.9.3
Affected: 16.9.4
Affected: 16.9.3a
Affected: 16.9.5
Affected: 16.9.5f
Affected: 16.9.6
Affected: 16.9.7
Affected: 16.9.8
Affected: 16.10.1
Affected: 16.10.1a
Affected: 16.10.1b
Affected: 16.10.1s
Affected: 16.10.1c
Affected: 16.10.1e
Affected: 16.10.1d
Affected: 16.10.2
Affected: 16.10.1f
Affected: 16.10.1g
Affected: 16.10.3
Affected: 3.10.0E
Affected: 3.10.1E
Affected: 3.10.0cE
Affected: 3.10.2E
Affected: 3.10.3E
Affected: 16.11.1
Affected: 16.11.1a
Affected: 16.11.1b
Affected: 16.11.2
Affected: 16.11.1s
Affected: 16.12.1
Affected: 16.12.1s
Affected: 16.12.1a
Affected: 16.12.1c
Affected: 16.12.1w
Affected: 16.12.2
Affected: 16.12.1y
Affected: 16.12.2a
Affected: 16.12.3
Affected: 16.12.8
Affected: 16.12.2s
Affected: 16.12.1x
Affected: 16.12.1t
Affected: 16.12.4
Affected: 16.12.3s
Affected: 16.12.3a
Affected: 16.12.4a
Affected: 16.12.5
Affected: 16.12.6
Affected: 16.12.1z1
Affected: 16.12.5a
Affected: 16.12.5b
Affected: 16.12.1z2
Affected: 16.12.6a
Affected: 16.12.7
Affected: 16.12.9
Affected: 16.12.10
Affected: 16.12.10a
Affected: 16.12.11
Affected: 16.12.12
Affected: 16.12.13
Affected: 3.11.0E
Affected: 3.11.1E
Affected: 3.11.2E
Affected: 3.11.3E
Affected: 3.11.1aE
Affected: 3.11.4E
Affected: 3.11.3aE
Affected: 3.11.5E
Affected: 3.11.6E
Affected: 3.11.7E
Affected: 3.11.8E
Affected: 3.11.9E
Affected: 3.11.10E
Affected: 3.11.11E
Affected: 3.11.12E
Affected: 17.1.1
Affected: 17.1.1a
Affected: 17.1.1s
Affected: 17.1.1t
Affected: 17.1.3
Affected: 17.2.1
Affected: 17.2.1r
Affected: 17.2.1a
Affected: 17.2.1v
Affected: 17.2.2
Affected: 17.2.3
Affected: 17.3.1
Affected: 17.3.2
Affected: 17.3.3
Affected: 17.3.1a
Affected: 17.3.1w
Affected: 17.3.2a
Affected: 17.3.1x
Affected: 17.3.1z
Affected: 17.3.4
Affected: 17.3.5
Affected: 17.3.4a
Affected: 17.3.6
Affected: 17.3.4b
Affected: 17.3.4c
Affected: 17.3.5a
Affected: 17.3.5b
Affected: 17.3.7
Affected: 17.3.8
Affected: 17.3.8a
Affected: 17.4.1
Affected: 17.4.2
Affected: 17.4.1a
Affected: 17.4.1b
Affected: 17.4.2a
Affected: 17.5.1
Affected: 17.5.1a
Affected: 17.6.1
Affected: 17.6.2
Affected: 17.6.1w
Affected: 17.6.1a
Affected: 17.6.1x
Affected: 17.6.3
Affected: 17.6.1y
Affected: 17.6.1z
Affected: 17.6.3a
Affected: 17.6.4
Affected: 17.6.1z1
Affected: 17.6.5
Affected: 17.6.6
Affected: 17.6.6a
Affected: 17.6.5a
Affected: 17.6.7
Affected: 17.6.8
Affected: 17.6.8a
Affected: 17.7.1
Affected: 17.7.1a
Affected: 17.7.1b
Affected: 17.7.2
Affected: 17.10.1
Affected: 17.10.1a
Affected: 17.10.1b
Affected: 17.8.1
Affected: 17.8.1a
Affected: 17.9.1
Affected: 17.9.1w
Affected: 17.9.2
Affected: 17.9.1a
Affected: 17.9.1x
Affected: 17.9.1y
Affected: 17.9.3
Affected: 17.9.2a
Affected: 17.9.1x1
Affected: 17.9.3a
Affected: 17.9.4
Affected: 17.9.1y1
Affected: 17.9.5
Affected: 17.9.4a
Affected: 17.9.5a
Affected: 17.9.5b
Affected: 17.9.6
Affected: 17.9.6a
Affected: 17.9.7
Affected: 17.9.5e
Affected: 17.9.5f
Affected: 17.9.7a
Affected: 17.9.7b
Affected: 17.11.1
Affected: 17.11.1a
Affected: 17.12.1
Affected: 17.12.1w
Affected: 17.12.1a
Affected: 17.12.1x
Affected: 17.12.2
Affected: 17.12.3
Affected: 17.12.2a
Affected: 17.12.1y
Affected: 17.12.1z
Affected: 17.12.4
Affected: 17.12.3a
Affected: 17.12.1z1
Affected: 17.12.1z2
Affected: 17.12.4a
Affected: 17.12.5
Affected: 17.12.4b
Affected: 17.12.1z3
Affected: 17.12.5a
Affected: 17.12.1z4
Affected: 17.12.5b
Affected: 17.12.5c
Affected: 17.13.1
Affected: 17.13.1a
Affected: 17.14.1
Affected: 17.14.1a
Affected: 17.15.1
Affected: 17.15.1w
Affected: 17.15.1a
Affected: 17.15.2
Affected: 17.15.1b
Affected: 17.15.1x
Affected: 17.15.1z
Affected: 17.15.3
Affected: 17.15.2c
Affected: 17.15.2a
Affected: 17.15.1y
Affected: 17.15.2b
Affected: 17.15.3a
Affected: 17.15.4
Affected: 17.15.3b
Affected: 17.16.1
Affected: 17.16.1a
Affected: 17.17.1
Affected: 17.18.1
Create a notification for this product.
    Cisco Cisco IOS XE Catalyst SD-WAN Affected: 16.9.1
Affected: 16.9.2
Affected: 16.9.3
Affected: 16.9.4
Affected: 16.10.1
Affected: 16.10.2
Affected: 16.10.3
Affected: 16.10.3a
Affected: 16.10.3b
Affected: 16.10.4
Affected: 16.10.5
Affected: 16.10.6
Affected: 16.11.1a
Affected: 16.12.1b
Affected: 16.12.1d
Affected: 16.12.1e
Affected: 16.12.2r
Affected: 16.12.3
Affected: 16.12.4
Affected: 16.12.4a
Affected: 16.12.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20352",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-27T03:55:24.975809Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2025-09-29",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T22:45:17.376Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20352"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2025-09-29T00:00:00+00:00",
            "value": "CVE-2025-20352 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "12.2(55)SE"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE3"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE2"
            },
            {
              "status": "affected",
              "version": "12.2(58)SE"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE1"
            },
            {
              "status": "affected",
              "version": "12.2(58)SE1"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE4"
            },
            {
              "status": "affected",
              "version": "12.2(58)SE2"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE5"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE6"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE7"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE8"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE9"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE10"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE11"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE12"
            },
            {
              "status": "affected",
              "version": "12.2(55)SE13"
            },
            {
              "status": "affected",
              "version": "12.2(58)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(53)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(55)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ1"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ2"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ3"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ4"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ5"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ6"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ7"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ8"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ9"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ10"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ11"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ12"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ13"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ14"
            },
            {
              "status": "affected",
              "version": "12.2(60)EZ15"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI2"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI3"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI5"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI4a"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI4"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI2a"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI6"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI7"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI1"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI8"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI9"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI8a"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI10"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI11"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI12"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI13"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXI14"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ2"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ1"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ3"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ4"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ5"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ6"
            },
            {
              "status": "affected",
              "version": "12.2(50)SQ7"
            },
            {
              "status": "affected",
              "version": "15.3(1)T"
            },
            {
              "status": "affected",
              "version": "15.3(2)T"
            },
            {
              "status": "affected",
              "version": "15.3(1)T1"
            },
            {
              "status": "affected",
              "version": "15.3(1)T2"
            },
            {
              "status": "affected",
              "version": "15.3(1)T3"
            },
            {
              "status": "affected",
              "version": "15.3(1)T4"
            },
            {
              "status": "affected",
              "version": "15.3(2)T1"
            },
            {
              "status": "affected",
              "version": "15.3(2)T2"
            },
            {
              "status": "affected",
              "version": "15.3(2)T3"
            },
            {
              "status": "affected",
              "version": "15.3(2)T4"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EY3"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE1"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE2"
            },
            {
              "status": "affected",
              "version": "15.0(1)SE3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE8"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE9"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE10"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE11"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE10a"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE12"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE13"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY7"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY8"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY7a"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY9"
            },
            {
              "status": "affected",
              "version": "15.0(1)SY10"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ1"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ2"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ3"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ4"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ5"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ6"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ7"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ8"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ9"
            },
            {
              "status": "affected",
              "version": "12.2(33)SXJ10"
            },
            {
              "status": "affected",
              "version": "15.1(1)SG"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG"
            },
            {
              "status": "affected",
              "version": "15.1(1)SG1"
            },
            {
              "status": "affected",
              "version": "15.1(1)SG2"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG1"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG2"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG3"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG4"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG5"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG6"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG7"
            },
            {
              "status": "affected",
              "version": "15.1(2)SG8"
            },
            {
              "status": "affected",
              "version": "15.2(4)M"
            },
            {
              "status": "affected",
              "version": "15.2(4)M1"
            },
            {
              "status": "affected",
              "version": "15.2(4)M2"
            },
            {
              "status": "affected",
              "version": "15.2(4)M4"
            },
            {
              "status": "affected",
              "version": "15.2(4)M3"
            },
            {
              "status": "affected",
              "version": "15.2(4)M5"
            },
            {
              "status": "affected",
              "version": "15.2(4)M8"
            },
            {
              "status": "affected",
              "version": "15.2(4)M10"
            },
            {
              "status": "affected",
              "version": "15.2(4)M7"
            },
            {
              "status": "affected",
              "version": "15.2(4)M6"
            },
            {
              "status": "affected",
              "version": "15.2(4)M9"
            },
            {
              "status": "affected",
              "version": "15.2(4)M6a"
            },
            {
              "status": "affected",
              "version": "15.2(4)M11"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG8"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG9"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG10"
            },
            {
              "status": "affected",
              "version": "15.0(2)SG11"
            },
            {
              "status": "affected",
              "version": "15.2(2)GC"
            },
            {
              "status": "affected",
              "version": "15.2(3)GC"
            },
            {
              "status": "affected",
              "version": "15.2(3)GC1"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC1"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC2"
            },
            {
              "status": "affected",
              "version": "15.2(4)GC3"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY1"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY2"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY3"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY4"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY5"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY4a"
            },
            {
              "status": "affected",
              "version": "15.1(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY6"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY7"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY8"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY9"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY10"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY11"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY12"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY13"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY14"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY15"
            },
            {
              "status": "affected",
              "version": "15.1(2)SY16"
            },
            {
              "status": "affected",
              "version": "15.4(1)T"
            },
            {
              "status": "affected",
              "version": "15.4(2)T"
            },
            {
              "status": "affected",
              "version": "15.4(1)T2"
            },
            {
              "status": "affected",
              "version": "15.4(1)T1"
            },
            {
              "status": "affected",
              "version": "15.4(1)T3"
            },
            {
              "status": "affected",
              "version": "15.4(2)T1"
            },
            {
              "status": "affected",
              "version": "15.4(2)T3"
            },
            {
              "status": "affected",
              "version": "15.4(2)T2"
            },
            {
              "status": "affected",
              "version": "15.4(1)T4"
            },
            {
              "status": "affected",
              "version": "15.4(2)T4"
            },
            {
              "status": "affected",
              "version": "15.0(2)EA"
            },
            {
              "status": "affected",
              "version": "15.0(2)EA1"
            },
            {
              "status": "affected",
              "version": "15.2(1)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E"
            },
            {
              "status": "affected",
              "version": "15.2(1)E1"
            },
            {
              "status": "affected",
              "version": "15.2(3)E"
            },
            {
              "status": "affected",
              "version": "15.2(1)E2"
            },
            {
              "status": "affected",
              "version": "15.2(1)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3a)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5"
            },
            {
              "status": "affected",
              "version": "15.2(4)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E4"
            },
            {
              "status": "affected",
              "version": "15.2(5)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E6"
            },
            {
              "status": "affected",
              "version": "15.2(5a)E"
            },
            {
              "status": "affected",
              "version": "15.2(5)E1"
            },
            {
              "status": "affected",
              "version": "15.2(5b)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5a"
            },
            {
              "status": "affected",
              "version": "15.2(5c)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5b"
            },
            {
              "status": "affected",
              "version": "15.2(5a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E7"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2"
            },
            {
              "status": "affected",
              "version": "15.2(6)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E5"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2c"
            },
            {
              "status": "affected",
              "version": "15.2(2)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E1"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0c"
            },
            {
              "status": "affected",
              "version": "15.2(4)E6"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2)E9"
            },
            {
              "status": "affected",
              "version": "15.2(4)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E10"
            },
            {
              "status": "affected",
              "version": "15.2(4)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0s"
            },
            {
              "status": "affected",
              "version": "15.2(6)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E9"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2"
            },
            {
              "status": "affected",
              "version": "15.2(7a)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1a"
            },
            {
              "status": "affected",
              "version": "15.2(7b)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3k"
            },
            {
              "status": "affected",
              "version": "15.2(8)E"
            },
            {
              "status": "affected",
              "version": "15.2(8)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E5"
            },
            {
              "status": "affected",
              "version": "15.2(7)E6"
            },
            {
              "status": "affected",
              "version": "15.2(8)E2"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10d"
            },
            {
              "status": "affected",
              "version": "15.2(7)E7"
            },
            {
              "status": "affected",
              "version": "15.2(8)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E8"
            },
            {
              "status": "affected",
              "version": "15.2(8)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E9"
            },
            {
              "status": "affected",
              "version": "15.2(8)E5"
            },
            {
              "status": "affected",
              "version": "15.2(8)E6"
            },
            {
              "status": "affected",
              "version": "15.2(7)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E11"
            },
            {
              "status": "affected",
              "version": "15.2(8)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E12"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB2"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB3"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB1"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB2"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3a"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB4"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB4"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3h"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB3b"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB5"
            },
            {
              "status": "affected",
              "version": "15.2(4)JB6"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB5"
            },
            {
              "status": "affected",
              "version": "15.2(2)JB6"
            },
            {
              "status": "affected",
              "version": "15.2(2)JAX"
            },
            {
              "status": "affected",
              "version": "15.3(3)M"
            },
            {
              "status": "affected",
              "version": "15.3(3)M1"
            },
            {
              "status": "affected",
              "version": "15.3(3)M2"
            },
            {
              "status": "affected",
              "version": "15.3(3)M3"
            },
            {
              "status": "affected",
              "version": "15.3(3)M5"
            },
            {
              "status": "affected",
              "version": "15.3(3)M4"
            },
            {
              "status": "affected",
              "version": "15.3(3)M6"
            },
            {
              "status": "affected",
              "version": "15.3(3)M7"
            },
            {
              "status": "affected",
              "version": "15.3(3)M8"
            },
            {
              "status": "affected",
              "version": "15.3(3)M9"
            },
            {
              "status": "affected",
              "version": "15.3(3)M10"
            },
            {
              "status": "affected",
              "version": "15.3(3)M8a"
            },
            {
              "status": "affected",
              "version": "15.2(4)JN"
            },
            {
              "status": "affected",
              "version": "15.2(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(2)EJ"
            },
            {
              "status": "affected",
              "version": "15.0(2)EJ1"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY0a"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY1a"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY1"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY2"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.2(2)SY3"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY7"
            },
            {
              "status": "affected",
              "version": "15.2(1)SY8"
            },
            {
              "status": "affected",
              "version": "15.2(5)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EK"
            },
            {
              "status": "affected",
              "version": "15.0(2)EK1"
            },
            {
              "status": "affected",
              "version": "15.4(1)CG"
            },
            {
              "status": "affected",
              "version": "15.4(1)CG1"
            },
            {
              "status": "affected",
              "version": "15.4(2)CG"
            },
            {
              "status": "affected",
              "version": "15.5(1)S"
            },
            {
              "status": "affected",
              "version": "15.5(2)S"
            },
            {
              "status": "affected",
              "version": "15.5(1)S1"
            },
            {
              "status": "affected",
              "version": "15.5(3)S"
            },
            {
              "status": "affected",
              "version": "15.5(1)S2"
            },
            {
              "status": "affected",
              "version": "15.5(1)S3"
            },
            {
              "status": "affected",
              "version": "15.5(2)S1"
            },
            {
              "status": "affected",
              "version": "15.5(2)S2"
            },
            {
              "status": "affected",
              "version": "15.5(3)S1"
            },
            {
              "status": "affected",
              "version": "15.5(3)S1a"
            },
            {
              "status": "affected",
              "version": "15.5(2)S3"
            },
            {
              "status": "affected",
              "version": "15.5(3)S2"
            },
            {
              "status": "affected",
              "version": "15.5(3)S0a"
            },
            {
              "status": "affected",
              "version": "15.5(3)S3"
            },
            {
              "status": "affected",
              "version": "15.5(1)S4"
            },
            {
              "status": "affected",
              "version": "15.5(2)S4"
            },
            {
              "status": "affected",
              "version": "15.5(3)S4"
            },
            {
              "status": "affected",
              "version": "15.5(3)S5"
            },
            {
              "status": "affected",
              "version": "15.5(3)S6"
            },
            {
              "status": "affected",
              "version": "15.5(3)S6a"
            },
            {
              "status": "affected",
              "version": "15.5(3)S7"
            },
            {
              "status": "affected",
              "version": "15.5(3)S6b"
            },
            {
              "status": "affected",
              "version": "15.5(3)S8"
            },
            {
              "status": "affected",
              "version": "15.5(3)S9"
            },
            {
              "status": "affected",
              "version": "15.5(3)S10"
            },
            {
              "status": "affected",
              "version": "15.5(3)S9a"
            },
            {
              "status": "affected",
              "version": "15.5(1)T"
            },
            {
              "status": "affected",
              "version": "15.5(1)T1"
            },
            {
              "status": "affected",
              "version": "15.5(2)T"
            },
            {
              "status": "affected",
              "version": "15.5(1)T2"
            },
            {
              "status": "affected",
              "version": "15.5(1)T3"
            },
            {
              "status": "affected",
              "version": "15.5(2)T1"
            },
            {
              "status": "affected",
              "version": "15.5(2)T2"
            },
            {
              "status": "affected",
              "version": "15.5(2)T3"
            },
            {
              "status": "affected",
              "version": "15.5(2)T4"
            },
            {
              "status": "affected",
              "version": "15.5(1)T4"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA1"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA2"
            },
            {
              "status": "affected",
              "version": "15.2(3)EA"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA1"
            },
            {
              "status": "affected",
              "version": "15.2(2)EA3"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA3"
            },
            {
              "status": "affected",
              "version": "15.2(5)EA"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA4"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA5"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA6"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA7"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA8"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JN9"
            },
            {
              "status": "affected",
              "version": "15.5(3)M"
            },
            {
              "status": "affected",
              "version": "15.5(3)M1"
            },
            {
              "status": "affected",
              "version": "15.5(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.5(3)M2"
            },
            {
              "status": "affected",
              "version": "15.5(3)M3"
            },
            {
              "status": "affected",
              "version": "15.5(3)M4"
            },
            {
              "status": "affected",
              "version": "15.5(3)M4a"
            },
            {
              "status": "affected",
              "version": "15.5(3)M5"
            },
            {
              "status": "affected",
              "version": "15.5(3)M6"
            },
            {
              "status": "affected",
              "version": "15.5(3)M7"
            },
            {
              "status": "affected",
              "version": "15.5(3)M6a"
            },
            {
              "status": "affected",
              "version": "15.5(3)M8"
            },
            {
              "status": "affected",
              "version": "15.5(3)M9"
            },
            {
              "status": "affected",
              "version": "15.5(3)M10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA1m"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JA12"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAA"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAA11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAA12"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JB"
            },
            {
              "status": "affected",
              "version": "15.5(3)SN"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD8"
            },
            {
              "status": "affected",
              "version": "15.6(1)S"
            },
            {
              "status": "affected",
              "version": "15.6(2)S"
            },
            {
              "status": "affected",
              "version": "15.6(2)S1"
            },
            {
              "status": "affected",
              "version": "15.6(1)S1"
            },
            {
              "status": "affected",
              "version": "15.6(1)S2"
            },
            {
              "status": "affected",
              "version": "15.6(2)S2"
            },
            {
              "status": "affected",
              "version": "15.6(1)S3"
            },
            {
              "status": "affected",
              "version": "15.6(2)S3"
            },
            {
              "status": "affected",
              "version": "15.6(1)S4"
            },
            {
              "status": "affected",
              "version": "15.6(2)S4"
            },
            {
              "status": "affected",
              "version": "15.6(1)T"
            },
            {
              "status": "affected",
              "version": "15.6(2)T"
            },
            {
              "status": "affected",
              "version": "15.6(1)T0a"
            },
            {
              "status": "affected",
              "version": "15.6(1)T1"
            },
            {
              "status": "affected",
              "version": "15.6(2)T1"
            },
            {
              "status": "affected",
              "version": "15.6(1)T2"
            },
            {
              "status": "affected",
              "version": "15.6(2)T2"
            },
            {
              "status": "affected",
              "version": "15.6(1)T3"
            },
            {
              "status": "affected",
              "version": "15.6(2)T3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNB5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAX"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAX1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JAX2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JBB6a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JC14"
            },
            {
              "status": "affected",
              "version": "15.3(1)SY"
            },
            {
              "status": "affected",
              "version": "15.3(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.3(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNC"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNC1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNC4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNP"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNP1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JNP3"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP1"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP2"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP3"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP4"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP5"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP6"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP7"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP8"
            },
            {
              "status": "affected",
              "version": "15.6(2)SP9"
            },
            {
              "status": "affected",
              "version": "15.6(2)SN"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPB"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPB1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD13"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD14"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD16"
            },
            {
              "status": "affected",
              "version": "15.3(3)JD17"
            },
            {
              "status": "affected",
              "version": "15.6(3)M"
            },
            {
              "status": "affected",
              "version": "15.6(3)M1"
            },
            {
              "status": "affected",
              "version": "15.6(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M1b"
            },
            {
              "status": "affected",
              "version": "15.6(3)M2"
            },
            {
              "status": "affected",
              "version": "15.6(3)M2a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M3"
            },
            {
              "status": "affected",
              "version": "15.6(3)M3a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M4"
            },
            {
              "status": "affected",
              "version": "15.6(3)M5"
            },
            {
              "status": "affected",
              "version": "15.6(3)M6"
            },
            {
              "status": "affected",
              "version": "15.6(3)M7"
            },
            {
              "status": "affected",
              "version": "15.6(3)M6a"
            },
            {
              "status": "affected",
              "version": "15.6(3)M6b"
            },
            {
              "status": "affected",
              "version": "15.6(3)M8"
            },
            {
              "status": "affected",
              "version": "15.6(3)M9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EC1"
            },
            {
              "status": "affected",
              "version": "15.2(4)EC2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPC5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JND3"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.4(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JE"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPD"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA13"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA14"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA16"
            },
            {
              "status": "affected",
              "version": "15.3(3)JDA17"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY1"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY2"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY3"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY4"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY5"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY6"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY7"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY8"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY9"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY10"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY11"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY12"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY13"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY14"
            },
            {
              "status": "affected",
              "version": "15.5(1)SY15"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF12"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF12i"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF14"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF14i"
            },
            {
              "status": "affected",
              "version": "15.3(3)JF15"
            },
            {
              "status": "affected",
              "version": "15.3(3)JCA7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JCA8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JCA9"
            },
            {
              "status": "affected",
              "version": "15.7(3)M"
            },
            {
              "status": "affected",
              "version": "15.7(3)M1"
            },
            {
              "status": "affected",
              "version": "15.7(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.7(3)M3"
            },
            {
              "status": "affected",
              "version": "15.7(3)M2"
            },
            {
              "status": "affected",
              "version": "15.7(3)M4"
            },
            {
              "status": "affected",
              "version": "15.7(3)M5"
            },
            {
              "status": "affected",
              "version": "15.7(3)M4a"
            },
            {
              "status": "affected",
              "version": "15.7(3)M4b"
            },
            {
              "status": "affected",
              "version": "15.7(3)M6"
            },
            {
              "status": "affected",
              "version": "15.7(3)M7"
            },
            {
              "status": "affected",
              "version": "15.7(3)M8"
            },
            {
              "status": "affected",
              "version": "15.7(3)M9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JG"
            },
            {
              "status": "affected",
              "version": "15.3(3)JG1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JH"
            },
            {
              "status": "affected",
              "version": "15.3(3)JH1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JI6"
            },
            {
              "status": "affected",
              "version": "15.8(3)M"
            },
            {
              "status": "affected",
              "version": "15.8(3)M1"
            },
            {
              "status": "affected",
              "version": "15.8(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M0b"
            },
            {
              "status": "affected",
              "version": "15.8(3)M2"
            },
            {
              "status": "affected",
              "version": "15.8(3)M1a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M3"
            },
            {
              "status": "affected",
              "version": "15.8(3)M2a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M4"
            },
            {
              "status": "affected",
              "version": "15.8(3)M3a"
            },
            {
              "status": "affected",
              "version": "15.8(3)M3b"
            },
            {
              "status": "affected",
              "version": "15.8(3)M5"
            },
            {
              "status": "affected",
              "version": "15.8(3)M6"
            },
            {
              "status": "affected",
              "version": "15.8(3)M7"
            },
            {
              "status": "affected",
              "version": "15.8(3)M8"
            },
            {
              "status": "affected",
              "version": "15.8(3)M9"
            },
            {
              "status": "affected",
              "version": "15.9(3)M"
            },
            {
              "status": "affected",
              "version": "15.9(3)M1"
            },
            {
              "status": "affected",
              "version": "15.9(3)M0a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M2"
            },
            {
              "status": "affected",
              "version": "15.9(3)M3"
            },
            {
              "status": "affected",
              "version": "15.9(3)M2a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M3a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M4"
            },
            {
              "status": "affected",
              "version": "15.9(3)M3b"
            },
            {
              "status": "affected",
              "version": "15.9(3)M5"
            },
            {
              "status": "affected",
              "version": "15.9(3)M4a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M6"
            },
            {
              "status": "affected",
              "version": "15.9(3)M7"
            },
            {
              "status": "affected",
              "version": "15.9(3)M6a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M6b"
            },
            {
              "status": "affected",
              "version": "15.9(3)M8"
            },
            {
              "status": "affected",
              "version": "15.9(3)M7a"
            },
            {
              "status": "affected",
              "version": "15.9(3)M9"
            },
            {
              "status": "affected",
              "version": "15.9(3)M8b"
            },
            {
              "status": "affected",
              "version": "15.9(3)M10"
            },
            {
              "status": "affected",
              "version": "15.9(3)M11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK2a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK1t"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK8a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK8b"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JK11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JJ"
            },
            {
              "status": "affected",
              "version": "15.3(3)JJ1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI1t"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI6a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI8a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPI10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ2t"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ3a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ7c"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ8a"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ10"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPJ11"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK7"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK8"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPK9"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPL"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPM"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPN6"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPO"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPP"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ2"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ3"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ4"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPQ5"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPR"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPS"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPT"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPT1"
            },
            {
              "status": "affected",
              "version": "15.3(3)JPT2"
            }
          ]
        },
        {
          "product": "Cisco IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.5.0E"
            },
            {
              "status": "affected",
              "version": "3.5.1E"
            },
            {
              "status": "affected",
              "version": "3.5.2E"
            },
            {
              "status": "affected",
              "version": "3.5.3E"
            },
            {
              "status": "affected",
              "version": "3.6.0E"
            },
            {
              "status": "affected",
              "version": "3.6.1E"
            },
            {
              "status": "affected",
              "version": "3.6.2aE"
            },
            {
              "status": "affected",
              "version": "3.6.2E"
            },
            {
              "status": "affected",
              "version": "3.6.3E"
            },
            {
              "status": "affected",
              "version": "3.6.4E"
            },
            {
              "status": "affected",
              "version": "3.6.5E"
            },
            {
              "status": "affected",
              "version": "3.6.6E"
            },
            {
              "status": "affected",
              "version": "3.6.5aE"
            },
            {
              "status": "affected",
              "version": "3.6.7E"
            },
            {
              "status": "affected",
              "version": "3.6.8E"
            },
            {
              "status": "affected",
              "version": "3.6.7bE"
            },
            {
              "status": "affected",
              "version": "3.6.9E"
            },
            {
              "status": "affected",
              "version": "3.6.10E"
            },
            {
              "status": "affected",
              "version": "3.14.0S"
            },
            {
              "status": "affected",
              "version": "3.14.1S"
            },
            {
              "status": "affected",
              "version": "3.14.2S"
            },
            {
              "status": "affected",
              "version": "3.14.3S"
            },
            {
              "status": "affected",
              "version": "3.14.4S"
            },
            {
              "status": "affected",
              "version": "3.15.0S"
            },
            {
              "status": "affected",
              "version": "3.15.1S"
            },
            {
              "status": "affected",
              "version": "3.15.2S"
            },
            {
              "status": "affected",
              "version": "3.15.1cS"
            },
            {
              "status": "affected",
              "version": "3.15.3S"
            },
            {
              "status": "affected",
              "version": "3.15.4S"
            },
            {
              "status": "affected",
              "version": "3.7.0E"
            },
            {
              "status": "affected",
              "version": "3.7.1E"
            },
            {
              "status": "affected",
              "version": "3.7.2E"
            },
            {
              "status": "affected",
              "version": "3.7.3E"
            },
            {
              "status": "affected",
              "version": "3.7.4E"
            },
            {
              "status": "affected",
              "version": "3.7.5E"
            },
            {
              "status": "affected",
              "version": "3.5.0SQ"
            },
            {
              "status": "affected",
              "version": "3.5.1SQ"
            },
            {
              "status": "affected",
              "version": "3.5.2SQ"
            },
            {
              "status": "affected",
              "version": "3.5.3SQ"
            },
            {
              "status": "affected",
              "version": "3.5.4SQ"
            },
            {
              "status": "affected",
              "version": "3.5.5SQ"
            },
            {
              "status": "affected",
              "version": "3.5.6SQ"
            },
            {
              "status": "affected",
              "version": "3.5.7SQ"
            },
            {
              "status": "affected",
              "version": "3.5.8SQ"
            },
            {
              "status": "affected",
              "version": "3.16.0S"
            },
            {
              "status": "affected",
              "version": "3.16.1S"
            },
            {
              "status": "affected",
              "version": "3.16.1aS"
            },
            {
              "status": "affected",
              "version": "3.16.2S"
            },
            {
              "status": "affected",
              "version": "3.16.2aS"
            },
            {
              "status": "affected",
              "version": "3.16.0cS"
            },
            {
              "status": "affected",
              "version": "3.16.3S"
            },
            {
              "status": "affected",
              "version": "3.16.2bS"
            },
            {
              "status": "affected",
              "version": "3.16.3aS"
            },
            {
              "status": "affected",
              "version": "3.16.4S"
            },
            {
              "status": "affected",
              "version": "3.16.4aS"
            },
            {
              "status": "affected",
              "version": "3.16.4bS"
            },
            {
              "status": "affected",
              "version": "3.16.5S"
            },
            {
              "status": "affected",
              "version": "3.16.4dS"
            },
            {
              "status": "affected",
              "version": "3.16.6S"
            },
            {
              "status": "affected",
              "version": "3.16.7S"
            },
            {
              "status": "affected",
              "version": "3.16.6bS"
            },
            {
              "status": "affected",
              "version": "3.16.7aS"
            },
            {
              "status": "affected",
              "version": "3.16.7bS"
            },
            {
              "status": "affected",
              "version": "3.16.8S"
            },
            {
              "status": "affected",
              "version": "3.16.9S"
            },
            {
              "status": "affected",
              "version": "3.16.10S"
            },
            {
              "status": "affected",
              "version": "3.17.0S"
            },
            {
              "status": "affected",
              "version": "3.17.1S"
            },
            {
              "status": "affected",
              "version": "3.17.2S"
            },
            {
              "status": "affected",
              "version": "3.17.1aS"
            },
            {
              "status": "affected",
              "version": "3.17.3S"
            },
            {
              "status": "affected",
              "version": "3.17.4S"
            },
            {
              "status": "affected",
              "version": "3.8.0E"
            },
            {
              "status": "affected",
              "version": "3.8.1E"
            },
            {
              "status": "affected",
              "version": "3.8.2E"
            },
            {
              "status": "affected",
              "version": "3.8.3E"
            },
            {
              "status": "affected",
              "version": "3.8.4E"
            },
            {
              "status": "affected",
              "version": "3.8.5E"
            },
            {
              "status": "affected",
              "version": "3.8.5aE"
            },
            {
              "status": "affected",
              "version": "3.8.6E"
            },
            {
              "status": "affected",
              "version": "3.8.7E"
            },
            {
              "status": "affected",
              "version": "3.8.8E"
            },
            {
              "status": "affected",
              "version": "3.8.9E"
            },
            {
              "status": "affected",
              "version": "3.8.10E"
            },
            {
              "status": "affected",
              "version": "3.18.0aS"
            },
            {
              "status": "affected",
              "version": "3.18.0S"
            },
            {
              "status": "affected",
              "version": "3.18.1S"
            },
            {
              "status": "affected",
              "version": "3.18.2S"
            },
            {
              "status": "affected",
              "version": "3.18.3S"
            },
            {
              "status": "affected",
              "version": "3.18.4S"
            },
            {
              "status": "affected",
              "version": "3.18.0SP"
            },
            {
              "status": "affected",
              "version": "3.18.1SP"
            },
            {
              "status": "affected",
              "version": "3.18.1aSP"
            },
            {
              "status": "affected",
              "version": "3.18.1bSP"
            },
            {
              "status": "affected",
              "version": "3.18.1cSP"
            },
            {
              "status": "affected",
              "version": "3.18.2SP"
            },
            {
              "status": "affected",
              "version": "3.18.2aSP"
            },
            {
              "status": "affected",
              "version": "3.18.3SP"
            },
            {
              "status": "affected",
              "version": "3.18.4SP"
            },
            {
              "status": "affected",
              "version": "3.18.3aSP"
            },
            {
              "status": "affected",
              "version": "3.18.3bSP"
            },
            {
              "status": "affected",
              "version": "3.18.5SP"
            },
            {
              "status": "affected",
              "version": "3.18.6SP"
            },
            {
              "status": "affected",
              "version": "3.18.7SP"
            },
            {
              "status": "affected",
              "version": "3.18.8aSP"
            },
            {
              "status": "affected",
              "version": "3.18.9SP"
            },
            {
              "status": "affected",
              "version": "3.9.0E"
            },
            {
              "status": "affected",
              "version": "3.9.1E"
            },
            {
              "status": "affected",
              "version": "3.9.2E"
            },
            {
              "status": "affected",
              "version": "16.6.1"
            },
            {
              "status": "affected",
              "version": "16.6.2"
            },
            {
              "status": "affected",
              "version": "16.6.3"
            },
            {
              "status": "affected",
              "version": "16.6.4"
            },
            {
              "status": "affected",
              "version": "16.6.5"
            },
            {
              "status": "affected",
              "version": "16.6.4a"
            },
            {
              "status": "affected",
              "version": "16.6.5a"
            },
            {
              "status": "affected",
              "version": "16.6.6"
            },
            {
              "status": "affected",
              "version": "16.6.7"
            },
            {
              "status": "affected",
              "version": "16.6.8"
            },
            {
              "status": "affected",
              "version": "16.6.9"
            },
            {
              "status": "affected",
              "version": "16.6.10"
            },
            {
              "status": "affected",
              "version": "16.7.1"
            },
            {
              "status": "affected",
              "version": "16.7.1a"
            },
            {
              "status": "affected",
              "version": "16.7.1b"
            },
            {
              "status": "affected",
              "version": "16.7.2"
            },
            {
              "status": "affected",
              "version": "16.7.3"
            },
            {
              "status": "affected",
              "version": "16.7.4"
            },
            {
              "status": "affected",
              "version": "16.8.1"
            },
            {
              "status": "affected",
              "version": "16.8.1a"
            },
            {
              "status": "affected",
              "version": "16.8.1b"
            },
            {
              "status": "affected",
              "version": "16.8.1s"
            },
            {
              "status": "affected",
              "version": "16.8.1c"
            },
            {
              "status": "affected",
              "version": "16.8.1d"
            },
            {
              "status": "affected",
              "version": "16.8.2"
            },
            {
              "status": "affected",
              "version": "16.8.1e"
            },
            {
              "status": "affected",
              "version": "16.8.3"
            },
            {
              "status": "affected",
              "version": "16.9.1"
            },
            {
              "status": "affected",
              "version": "16.9.2"
            },
            {
              "status": "affected",
              "version": "16.9.1a"
            },
            {
              "status": "affected",
              "version": "16.9.1b"
            },
            {
              "status": "affected",
              "version": "16.9.1s"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.9.3a"
            },
            {
              "status": "affected",
              "version": "16.9.5"
            },
            {
              "status": "affected",
              "version": "16.9.5f"
            },
            {
              "status": "affected",
              "version": "16.9.6"
            },
            {
              "status": "affected",
              "version": "16.9.7"
            },
            {
              "status": "affected",
              "version": "16.9.8"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.10.1a"
            },
            {
              "status": "affected",
              "version": "16.10.1b"
            },
            {
              "status": "affected",
              "version": "16.10.1s"
            },
            {
              "status": "affected",
              "version": "16.10.1c"
            },
            {
              "status": "affected",
              "version": "16.10.1e"
            },
            {
              "status": "affected",
              "version": "16.10.1d"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.10.1f"
            },
            {
              "status": "affected",
              "version": "16.10.1g"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "3.10.0E"
            },
            {
              "status": "affected",
              "version": "3.10.1E"
            },
            {
              "status": "affected",
              "version": "3.10.0cE"
            },
            {
              "status": "affected",
              "version": "3.10.2E"
            },
            {
              "status": "affected",
              "version": "3.10.3E"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.11.2"
            },
            {
              "status": "affected",
              "version": "16.11.1s"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.12.1s"
            },
            {
              "status": "affected",
              "version": "16.12.1a"
            },
            {
              "status": "affected",
              "version": "16.12.1c"
            },
            {
              "status": "affected",
              "version": "16.12.1w"
            },
            {
              "status": "affected",
              "version": "16.12.2"
            },
            {
              "status": "affected",
              "version": "16.12.1y"
            },
            {
              "status": "affected",
              "version": "16.12.2a"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.8"
            },
            {
              "status": "affected",
              "version": "16.12.2s"
            },
            {
              "status": "affected",
              "version": "16.12.1x"
            },
            {
              "status": "affected",
              "version": "16.12.1t"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.12.3s"
            },
            {
              "status": "affected",
              "version": "16.12.3a"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            },
            {
              "status": "affected",
              "version": "16.12.6"
            },
            {
              "status": "affected",
              "version": "16.12.1z1"
            },
            {
              "status": "affected",
              "version": "16.12.5a"
            },
            {
              "status": "affected",
              "version": "16.12.5b"
            },
            {
              "status": "affected",
              "version": "16.12.1z2"
            },
            {
              "status": "affected",
              "version": "16.12.6a"
            },
            {
              "status": "affected",
              "version": "16.12.7"
            },
            {
              "status": "affected",
              "version": "16.12.9"
            },
            {
              "status": "affected",
              "version": "16.12.10"
            },
            {
              "status": "affected",
              "version": "16.12.10a"
            },
            {
              "status": "affected",
              "version": "16.12.11"
            },
            {
              "status": "affected",
              "version": "16.12.12"
            },
            {
              "status": "affected",
              "version": "16.12.13"
            },
            {
              "status": "affected",
              "version": "3.11.0E"
            },
            {
              "status": "affected",
              "version": "3.11.1E"
            },
            {
              "status": "affected",
              "version": "3.11.2E"
            },
            {
              "status": "affected",
              "version": "3.11.3E"
            },
            {
              "status": "affected",
              "version": "3.11.1aE"
            },
            {
              "status": "affected",
              "version": "3.11.4E"
            },
            {
              "status": "affected",
              "version": "3.11.3aE"
            },
            {
              "status": "affected",
              "version": "3.11.5E"
            },
            {
              "status": "affected",
              "version": "3.11.6E"
            },
            {
              "status": "affected",
              "version": "3.11.7E"
            },
            {
              "status": "affected",
              "version": "3.11.8E"
            },
            {
              "status": "affected",
              "version": "3.11.9E"
            },
            {
              "status": "affected",
              "version": "3.11.10E"
            },
            {
              "status": "affected",
              "version": "3.11.11E"
            },
            {
              "status": "affected",
              "version": "3.11.12E"
            },
            {
              "status": "affected",
              "version": "17.1.1"
            },
            {
              "status": "affected",
              "version": "17.1.1a"
            },
            {
              "status": "affected",
              "version": "17.1.1s"
            },
            {
              "status": "affected",
              "version": "17.1.1t"
            },
            {
              "status": "affected",
              "version": "17.1.3"
            },
            {
              "status": "affected",
              "version": "17.2.1"
            },
            {
              "status": "affected",
              "version": "17.2.1r"
            },
            {
              "status": "affected",
              "version": "17.2.1a"
            },
            {
              "status": "affected",
              "version": "17.2.1v"
            },
            {
              "status": "affected",
              "version": "17.2.2"
            },
            {
              "status": "affected",
              "version": "17.2.3"
            },
            {
              "status": "affected",
              "version": "17.3.1"
            },
            {
              "status": "affected",
              "version": "17.3.2"
            },
            {
              "status": "affected",
              "version": "17.3.3"
            },
            {
              "status": "affected",
              "version": "17.3.1a"
            },
            {
              "status": "affected",
              "version": "17.3.1w"
            },
            {
              "status": "affected",
              "version": "17.3.2a"
            },
            {
              "status": "affected",
              "version": "17.3.1x"
            },
            {
              "status": "affected",
              "version": "17.3.1z"
            },
            {
              "status": "affected",
              "version": "17.3.4"
            },
            {
              "status": "affected",
              "version": "17.3.5"
            },
            {
              "status": "affected",
              "version": "17.3.4a"
            },
            {
              "status": "affected",
              "version": "17.3.6"
            },
            {
              "status": "affected",
              "version": "17.3.4b"
            },
            {
              "status": "affected",
              "version": "17.3.4c"
            },
            {
              "status": "affected",
              "version": "17.3.5a"
            },
            {
              "status": "affected",
              "version": "17.3.5b"
            },
            {
              "status": "affected",
              "version": "17.3.7"
            },
            {
              "status": "affected",
              "version": "17.3.8"
            },
            {
              "status": "affected",
              "version": "17.3.8a"
            },
            {
              "status": "affected",
              "version": "17.4.1"
            },
            {
              "status": "affected",
              "version": "17.4.2"
            },
            {
              "status": "affected",
              "version": "17.4.1a"
            },
            {
              "status": "affected",
              "version": "17.4.1b"
            },
            {
              "status": "affected",
              "version": "17.4.2a"
            },
            {
              "status": "affected",
              "version": "17.5.1"
            },
            {
              "status": "affected",
              "version": "17.5.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.1w"
            },
            {
              "status": "affected",
              "version": "17.6.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1x"
            },
            {
              "status": "affected",
              "version": "17.6.3"
            },
            {
              "status": "affected",
              "version": "17.6.1y"
            },
            {
              "status": "affected",
              "version": "17.6.1z"
            },
            {
              "status": "affected",
              "version": "17.6.3a"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.6.1z1"
            },
            {
              "status": "affected",
              "version": "17.6.5"
            },
            {
              "status": "affected",
              "version": "17.6.6"
            },
            {
              "status": "affected",
              "version": "17.6.6a"
            },
            {
              "status": "affected",
              "version": "17.6.5a"
            },
            {
              "status": "affected",
              "version": "17.6.7"
            },
            {
              "status": "affected",
              "version": "17.6.8"
            },
            {
              "status": "affected",
              "version": "17.6.8a"
            },
            {
              "status": "affected",
              "version": "17.7.1"
            },
            {
              "status": "affected",
              "version": "17.7.1a"
            },
            {
              "status": "affected",
              "version": "17.7.1b"
            },
            {
              "status": "affected",
              "version": "17.7.2"
            },
            {
              "status": "affected",
              "version": "17.10.1"
            },
            {
              "status": "affected",
              "version": "17.10.1a"
            },
            {
              "status": "affected",
              "version": "17.10.1b"
            },
            {
              "status": "affected",
              "version": "17.8.1"
            },
            {
              "status": "affected",
              "version": "17.8.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1"
            },
            {
              "status": "affected",
              "version": "17.9.1w"
            },
            {
              "status": "affected",
              "version": "17.9.2"
            },
            {
              "status": "affected",
              "version": "17.9.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1x"
            },
            {
              "status": "affected",
              "version": "17.9.1y"
            },
            {
              "status": "affected",
              "version": "17.9.3"
            },
            {
              "status": "affected",
              "version": "17.9.2a"
            },
            {
              "status": "affected",
              "version": "17.9.1x1"
            },
            {
              "status": "affected",
              "version": "17.9.3a"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.9.1y1"
            },
            {
              "status": "affected",
              "version": "17.9.5"
            },
            {
              "status": "affected",
              "version": "17.9.4a"
            },
            {
              "status": "affected",
              "version": "17.9.5a"
            },
            {
              "status": "affected",
              "version": "17.9.5b"
            },
            {
              "status": "affected",
              "version": "17.9.6"
            },
            {
              "status": "affected",
              "version": "17.9.6a"
            },
            {
              "status": "affected",
              "version": "17.9.7"
            },
            {
              "status": "affected",
              "version": "17.9.5e"
            },
            {
              "status": "affected",
              "version": "17.9.5f"
            },
            {
              "status": "affected",
              "version": "17.9.7a"
            },
            {
              "status": "affected",
              "version": "17.9.7b"
            },
            {
              "status": "affected",
              "version": "17.11.1"
            },
            {
              "status": "affected",
              "version": "17.11.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1"
            },
            {
              "status": "affected",
              "version": "17.12.1w"
            },
            {
              "status": "affected",
              "version": "17.12.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1x"
            },
            {
              "status": "affected",
              "version": "17.12.2"
            },
            {
              "status": "affected",
              "version": "17.12.3"
            },
            {
              "status": "affected",
              "version": "17.12.2a"
            },
            {
              "status": "affected",
              "version": "17.12.1y"
            },
            {
              "status": "affected",
              "version": "17.12.1z"
            },
            {
              "status": "affected",
              "version": "17.12.4"
            },
            {
              "status": "affected",
              "version": "17.12.3a"
            },
            {
              "status": "affected",
              "version": "17.12.1z1"
            },
            {
              "status": "affected",
              "version": "17.12.1z2"
            },
            {
              "status": "affected",
              "version": "17.12.4a"
            },
            {
              "status": "affected",
              "version": "17.12.5"
            },
            {
              "status": "affected",
              "version": "17.12.4b"
            },
            {
              "status": "affected",
              "version": "17.12.1z3"
            },
            {
              "status": "affected",
              "version": "17.12.5a"
            },
            {
              "status": "affected",
              "version": "17.12.1z4"
            },
            {
              "status": "affected",
              "version": "17.12.5b"
            },
            {
              "status": "affected",
              "version": "17.12.5c"
            },
            {
              "status": "affected",
              "version": "17.13.1"
            },
            {
              "status": "affected",
              "version": "17.13.1a"
            },
            {
              "status": "affected",
              "version": "17.14.1"
            },
            {
              "status": "affected",
              "version": "17.14.1a"
            },
            {
              "status": "affected",
              "version": "17.15.1"
            },
            {
              "status": "affected",
              "version": "17.15.1w"
            },
            {
              "status": "affected",
              "version": "17.15.1a"
            },
            {
              "status": "affected",
              "version": "17.15.2"
            },
            {
              "status": "affected",
              "version": "17.15.1b"
            },
            {
              "status": "affected",
              "version": "17.15.1x"
            },
            {
              "status": "affected",
              "version": "17.15.1z"
            },
            {
              "status": "affected",
              "version": "17.15.3"
            },
            {
              "status": "affected",
              "version": "17.15.2c"
            },
            {
              "status": "affected",
              "version": "17.15.2a"
            },
            {
              "status": "affected",
              "version": "17.15.1y"
            },
            {
              "status": "affected",
              "version": "17.15.2b"
            },
            {
              "status": "affected",
              "version": "17.15.3a"
            },
            {
              "status": "affected",
              "version": "17.15.4"
            },
            {
              "status": "affected",
              "version": "17.15.3b"
            },
            {
              "status": "affected",
              "version": "17.16.1"
            },
            {
              "status": "affected",
              "version": "17.16.1a"
            },
            {
              "status": "affected",
              "version": "17.17.1"
            },
            {
              "status": "affected",
              "version": "17.18.1"
            }
          ]
        },
        {
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.9.1"
            },
            {
              "status": "affected",
              "version": "16.9.2"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "16.10.3a"
            },
            {
              "status": "affected",
              "version": "16.10.3b"
            },
            {
              "status": "affected",
              "version": "16.10.4"
            },
            {
              "status": "affected",
              "version": "16.10.5"
            },
            {
              "status": "affected",
              "version": "16.10.6"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.12.1b"
            },
            {
              "status": "affected",
              "version": "16.12.1d"
            },
            {
              "status": "affected",
              "version": "16.12.1e"
            },
            {
              "status": "affected",
              "version": "16.12.2r"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:\r\n\r \r An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. \r An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. \r \r An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. \r\n\r This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.\r\n\r Note: This vulnerability affects all versions of SNMP."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) became aware of successful exploitation of this vulnerability in the wild after local Administrator credentials were compromised. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "Stack-based Buffer Overflow",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-30T16:18:05.082Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-snmp-x4LPhte",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"
        }
      ],
      "source": {
        "advisory": "cisco-sa-snmp-x4LPhte",
        "defects": [
          "CSCwq31287"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20352",
    "datePublished": "2025-09-24T17:10:42.891Z",
    "dateReserved": "2024-10-10T19:15:13.257Z",
    "dateUpdated": "2025-10-21T22:45:17.376Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20151 (GCVE-0-2025-20151)

Vulnerability from nvd – Published: 2025-05-07 17:18 – Updated: 2025-05-07 19:46
VLAI?
Summary
A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration. This vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied. Note: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials. For more information, see the section of this advisory.
CWE
Assigner
Impacted products
Vendor Product Version
Cisco Cisco IOS XE Catalyst SD-WAN Affected: 16.10.6
Affected: 16.12.3
Affected: 16.12.1
Affected: 16.12.1a
Affected: 16.12.4a
Affected: 16.12.2r
Affected: 16.12.1c
Affected: 16.10.4
Affected: 16.12.1b1
Affected: 16.10.5
Affected: 16.12.4
Affected: 16.10.3
Affected: 16.10.3a
Affected: 16.12.1b
Affected: 16.10.3b
Affected: 16.12.1d
Affected: 16.11.1s
Affected: 16.9.1
Affected: 16.11.1a
Affected: 16.11.1d
Affected: 16.9.2
Affected: 16.10.1
Affected: 16.11.1f
Affected: 16.9.4
Affected: 16.9.3
Affected: 16.10.2
Affected: 16.12.1e
Affected: 16.11.1b
Affected: 16.11.1
Affected: 16.12.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20151",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-07T18:56:21.184209Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:46:24.894Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.10.6"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.12.1a"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.2r"
            },
            {
              "status": "affected",
              "version": "16.12.1c"
            },
            {
              "status": "affected",
              "version": "16.10.4"
            },
            {
              "status": "affected",
              "version": "16.12.1b1"
            },
            {
              "status": "affected",
              "version": "16.10.5"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "16.10.3a"
            },
            {
              "status": "affected",
              "version": "16.12.1b"
            },
            {
              "status": "affected",
              "version": "16.10.3b"
            },
            {
              "status": "affected",
              "version": "16.12.1d"
            },
            {
              "status": "affected",
              "version": "16.11.1s"
            },
            {
              "status": "affected",
              "version": "16.9.1"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.11.1d"
            },
            {
              "status": "affected",
              "version": "16.9.2"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.11.1f"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.12.1e"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration.\r\n\r\nThis vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied.\r\nNote: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials.\r\nFor more information, see the  section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-16",
              "description": "Configuration",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-07T17:18:44.414Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-snmpv3-qKEYvzsy",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpv3-qKEYvzsy"
        }
      ],
      "source": {
        "advisory": "cisco-sa-snmpv3-qKEYvzsy",
        "defects": [
          "CSCwi84832"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20151",
    "datePublished": "2025-05-07T17:18:44.414Z",
    "dateReserved": "2024-10-10T19:15:13.216Z",
    "dateUpdated": "2025-05-07T19:46:24.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20373 (GCVE-0-2024-20373)

Vulnerability from nvd – Published: 2024-11-15 14:52 – Updated: 2024-11-15 16:20
VLAI?
Summary
A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.  This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials. SNMP with IPv6 ACL configurations is not affected. For more information, see the section of this advisory.
CWE
  • CWE-284 - Improper Access Control
Assigner
Impacted products
Vendor Product Version
Cisco Cisco IOS XE Catalyst SD-WAN Affected: 16.10.6
Affected: 16.12.3
Affected: 16.12.1
Affected: 16.10.4
Affected: 16.10.5
Affected: 16.12.4
Affected: 16.10.3
Affected: 16.10.3a
Affected: 16.10.3b
Affected: 16.11.1s
Affected: 16.11.1a
Affected: 16.10.1
Affected: 16.11.1f
Affected: 16.9.4
Affected: 16.9.3
Affected: 16.10.2
Affected: 16.11.1b
Affected: 16.11.1
Affected: 16.12.5
Affected: 16.11.1d
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3a:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3b:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1a:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1b:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1d:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1f:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1s:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.9.3:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ios_xe_catalyst_sd-wan",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "16.10.1"
              },
              {
                "status": "affected",
                "version": "16.10.2"
              },
              {
                "status": "affected",
                "version": "16.10.3"
              },
              {
                "status": "affected",
                "version": "16.10.3a"
              },
              {
                "status": "affected",
                "version": "16.10.3b"
              },
              {
                "status": "affected",
                "version": "16.10.4"
              },
              {
                "status": "affected",
                "version": "16.10.5"
              },
              {
                "status": "affected",
                "version": "16.10.6"
              },
              {
                "status": "affected",
                "version": "16.11.1"
              },
              {
                "status": "affected",
                "version": "16.11.1a"
              },
              {
                "status": "affected",
                "version": "16.11.1b"
              },
              {
                "status": "affected",
                "version": "16.11.1d"
              },
              {
                "status": "affected",
                "version": "16.11.1f"
              },
              {
                "status": "affected",
                "version": "16.11.1s"
              },
              {
                "status": "affected",
                "version": "16.12.1"
              },
              {
                "status": "affected",
                "version": "16.12.3"
              },
              {
                "status": "affected",
                "version": "16.12.4"
              },
              {
                "status": "affected",
                "version": "16.12.5"
              },
              {
                "status": "affected",
                "version": "16.9.3"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20373",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:20:19.710967Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:20:59.945Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.10.6"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.10.4"
            },
            {
              "status": "affected",
              "version": "16.10.5"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.10.3"
            },
            {
              "status": "affected",
              "version": "16.10.3a"
            },
            {
              "status": "affected",
              "version": "16.10.3b"
            },
            {
              "status": "affected",
              "version": "16.11.1s"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "16.11.1f"
            },
            {
              "status": "affected",
              "version": "16.9.4"
            },
            {
              "status": "affected",
              "version": "16.9.3"
            },
            {
              "status": "affected",
              "version": "16.10.2"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            },
            {
              "status": "affected",
              "version": "16.11.1d"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.\u0026nbsp;\r\n\r\nThis vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.\r\nSNMP with IPv6 ACL configurations is not affected.\r\nFor more information, see the  section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T14:52:34.137Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-snmp-uwBXfqww",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uwBXfqww"
        }
      ],
      "source": {
        "advisory": "cisco-sa-snmp-uwBXfqww",
        "defects": [
          "CSCwe24431"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS and Cisco IOS XE SNMP Extended ACL Bypass Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20373",
    "datePublished": "2024-11-15T14:52:34.137Z",
    "dateReserved": "2023-11-08T15:08:07.654Z",
    "dateUpdated": "2024-11-15T16:20:59.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20455 (GCVE-0-2024-20455)

Vulnerability from nvd – Published: 2024-09-25 16:18 – Updated: 2024-09-25 19:47
VLAI?
Summary
A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability.
CWE
Assigner
Impacted products
Vendor Product Version
Cisco Cisco IOS XE Software Affected: 17.1.1
Affected: 17.1.1a
Affected: 17.1.1s
Affected: 17.1.1t
Affected: 17.1.3
Affected: 17.2.1
Affected: 17.2.1r
Affected: 17.2.1a
Affected: 17.2.1v
Affected: 17.2.2
Affected: 17.2.3
Affected: 17.3.1
Affected: 17.3.2
Affected: 17.3.3
Affected: 17.3.1a
Affected: 17.3.1w
Affected: 17.3.2a
Affected: 17.3.1x
Affected: 17.3.1z
Affected: 17.3.4
Affected: 17.3.5
Affected: 17.3.4a
Affected: 17.3.6
Affected: 17.3.4b
Affected: 17.3.4c
Affected: 17.3.5a
Affected: 17.3.5b
Affected: 17.3.7
Affected: 17.3.8
Affected: 17.3.8a
Affected: 17.4.1
Affected: 17.4.2
Affected: 17.4.1a
Affected: 17.4.1b
Affected: 17.4.2a
Affected: 17.5.1
Affected: 17.5.1a
Affected: 17.6.1
Affected: 17.6.2
Affected: 17.6.1w
Affected: 17.6.1a
Affected: 17.6.1x
Affected: 17.6.3
Affected: 17.6.1y
Affected: 17.6.1z
Affected: 17.6.3a
Affected: 17.6.4
Affected: 17.6.1z1
Affected: 17.6.5
Affected: 17.6.6
Affected: 17.6.6a
Affected: 17.6.5a
Affected: 17.7.1
Affected: 17.7.1a
Affected: 17.7.1b
Affected: 17.7.2
Affected: 17.10.1
Affected: 17.10.1a
Affected: 17.10.1b
Affected: 17.8.1
Affected: 17.8.1a
Affected: 17.9.1
Affected: 17.9.1w
Affected: 17.9.2
Affected: 17.9.1a
Affected: 17.9.1x
Affected: 17.9.1y
Affected: 17.9.3
Affected: 17.9.2a
Affected: 17.9.1x1
Affected: 17.9.3a
Affected: 17.9.4
Affected: 17.9.1y1
Affected: 17.9.5
Affected: 17.9.4a
Affected: 17.9.5a
Affected: 17.9.5b
Affected: 17.11.1
Affected: 17.11.1a
Affected: 17.12.1
Affected: 17.12.1w
Affected: 17.12.1a
Affected: 17.12.2
Affected: 17.12.2a
Affected: 17.13.1
Affected: 17.13.1a
Affected: 17.11.99SW
Create a notification for this product.
    Cisco Cisco IOS XE Catalyst SD-WAN Affected: 17.5.1a
Affected: 17.6.1a
Affected: 17.6.2
Affected: 17.6.4
Affected: 17.7.1a
Affected: 17.9.1a
Affected: 17.9.2a
Affected: 17.9.3a
Affected: 17.9.4
Affected: 17.8.1a
Affected: 17.10.1a
Affected: 17.11.1a
Affected: 17.12.1a
Affected: 17.13.1a
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ios_xe",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "17.1.1"
              },
              {
                "status": "affected",
                "version": "17.1.1a"
              },
              {
                "status": "affected",
                "version": "17.1.1s"
              },
              {
                "status": "affected",
                "version": "17.1.1t"
              },
              {
                "status": "affected",
                "version": "17.1.3"
              },
              {
                "status": "affected",
                "version": "17.2.1"
              },
              {
                "status": "affected",
                "version": "17.2.1r"
              },
              {
                "status": "affected",
                "version": "17.2.1a"
              },
              {
                "status": "affected",
                "version": "17.2.1v"
              },
              {
                "status": "affected",
                "version": "17.2.2"
              },
              {
                "status": "affected",
                "version": "17.2.3"
              },
              {
                "status": "affected",
                "version": "17.3.1"
              },
              {
                "status": "affected",
                "version": "17.3.2"
              },
              {
                "status": "affected",
                "version": "17.3.3"
              },
              {
                "status": "affected",
                "version": "17.3.1a"
              },
              {
                "status": "affected",
                "version": "17.3.1w"
              },
              {
                "status": "affected",
                "version": "17.3.2a"
              },
              {
                "status": "affected",
                "version": "17.3.1x"
              },
              {
                "status": "affected",
                "version": "17.3.1z"
              },
              {
                "status": "affected",
                "version": "17.3.4"
              },
              {
                "status": "affected",
                "version": "17.3.5"
              },
              {
                "status": "affected",
                "version": "17.3.4a"
              },
              {
                "status": "affected",
                "version": "17.3.6"
              },
              {
                "status": "affected",
                "version": "17.3.4b"
              },
              {
                "status": "affected",
                "version": "17.3.4c"
              },
              {
                "status": "affected",
                "version": "17.3.5a"
              },
              {
                "status": "affected",
                "version": "17.3.5b"
              },
              {
                "status": "affected",
                "version": "17.3.7"
              },
              {
                "status": "affected",
                "version": "17.3.8"
              },
              {
                "status": "affected",
                "version": "17.3.8a"
              },
              {
                "status": "affected",
                "version": "17.4.1"
              },
              {
                "status": "affected",
                "version": "17.4.2"
              },
              {
                "status": "affected",
                "version": "17.4.1a"
              },
              {
                "status": "affected",
                "version": "17.4.1b"
              },
              {
                "status": "affected",
                "version": "17.4.2a"
              },
              {
                "status": "affected",
                "version": "17.5.1"
              },
              {
                "status": "affected",
                "version": "17.5.1a"
              },
              {
                "status": "affected",
                "version": "17.6.1"
              },
              {
                "status": "affected",
                "version": "17.6.2"
              },
              {
                "status": "affected",
                "version": "17.6.1w"
              },
              {
                "status": "affected",
                "version": "17.6.1a"
              },
              {
                "status": "affected",
                "version": "17.6.1x"
              },
              {
                "status": "affected",
                "version": "17.6.3"
              },
              {
                "status": "affected",
                "version": "17.6.1y"
              },
              {
                "status": "affected",
                "version": "17.6.1z"
              },
              {
                "status": "affected",
                "version": "17.6.3a"
              },
              {
                "status": "affected",
                "version": "17.6.4"
              },
              {
                "status": "affected",
                "version": "17.6.1z1"
              },
              {
                "status": "affected",
                "version": "17.6.5"
              },
              {
                "status": "affected",
                "version": "17.6.6"
              },
              {
                "status": "affected",
                "version": "17.6.6a"
              },
              {
                "status": "affected",
                "version": "17.6.5a"
              },
              {
                "status": "affected",
                "version": "17.7.1"
              },
              {
                "status": "affected",
                "version": "17.7.1a"
              },
              {
                "status": "affected",
                "version": "17.7.1b"
              },
              {
                "status": "affected",
                "version": "17.7.2"
              },
              {
                "status": "affected",
                "version": "17.10.1"
              },
              {
                "status": "affected",
                "version": "17.10.1a"
              },
              {
                "status": "affected",
                "version": "17.10.1b"
              },
              {
                "status": "affected",
                "version": "17.8.1"
              },
              {
                "status": "affected",
                "version": "17.8.1a"
              },
              {
                "status": "affected",
                "version": "17.9.1"
              },
              {
                "status": "affected",
                "version": "17.9.1w"
              },
              {
                "status": "affected",
                "version": "17.9.2"
              },
              {
                "status": "affected",
                "version": "17.9.1a"
              },
              {
                "status": "affected",
                "version": "17.9.1x"
              },
              {
                "status": "affected",
                "version": "17.9.1y"
              },
              {
                "status": "affected",
                "version": "17.9.3"
              },
              {
                "status": "affected",
                "version": "17.9.2a"
              },
              {
                "status": "affected",
                "version": "17.9.1x1"
              },
              {
                "status": "affected",
                "version": "17.9.3a"
              },
              {
                "status": "affected",
                "version": "17.9.4"
              },
              {
                "status": "affected",
                "version": "17.9.1y1"
              },
              {
                "status": "affected",
                "version": "17.9.5"
              },
              {
                "status": "affected",
                "version": "17.9.4a"
              },
              {
                "status": "affected",
                "version": "17.9.5a"
              },
              {
                "status": "affected",
                "version": "17.9.5b"
              },
              {
                "status": "affected",
                "version": "17.11.1"
              },
              {
                "status": "affected",
                "version": "17.11.1a"
              },
              {
                "status": "affected",
                "version": "17.12.1"
              },
              {
                "status": "affected",
                "version": "17.12.1w"
              },
              {
                "status": "affected",
                "version": "17.12.1a"
              },
              {
                "status": "affected",
                "version": "17.12.2"
              },
              {
                "status": "affected",
                "version": "17.12.2a"
              },
              {
                "status": "affected",
                "version": "17.13.1"
              },
              {
                "status": "affected",
                "version": "17.13.1a"
              },
              {
                "status": "affected",
                "version": "17.11.99sw"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ios_xe_catalyst_sd-wan",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "17.5.1a"
              },
              {
                "status": "affected",
                "version": "17.6.1a"
              },
              {
                "status": "affected",
                "version": "17.6.2"
              },
              {
                "status": "affected",
                "version": "17.6.4"
              },
              {
                "status": "affected",
                "version": "17.7.1a"
              },
              {
                "status": "affected",
                "version": "17.9.1a"
              },
              {
                "status": "affected",
                "version": "17.9.2a"
              },
              {
                "status": "affected",
                "version": "17.9.3a"
              },
              {
                "status": "affected",
                "version": "17.9.4"
              },
              {
                "status": "affected",
                "version": "17.8.1a"
              },
              {
                "status": "affected",
                "version": "17.10.1a"
              },
              {
                "status": "affected",
                "version": "17.11.1a"
              },
              {
                "status": "affected",
                "version": "17.12.1a"
              },
              {
                "status": "affected",
                "version": "17.13.1a"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20455",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T19:29:31.898015Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T19:47:05.368Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "17.1.1"
            },
            {
              "status": "affected",
              "version": "17.1.1a"
            },
            {
              "status": "affected",
              "version": "17.1.1s"
            },
            {
              "status": "affected",
              "version": "17.1.1t"
            },
            {
              "status": "affected",
              "version": "17.1.3"
            },
            {
              "status": "affected",
              "version": "17.2.1"
            },
            {
              "status": "affected",
              "version": "17.2.1r"
            },
            {
              "status": "affected",
              "version": "17.2.1a"
            },
            {
              "status": "affected",
              "version": "17.2.1v"
            },
            {
              "status": "affected",
              "version": "17.2.2"
            },
            {
              "status": "affected",
              "version": "17.2.3"
            },
            {
              "status": "affected",
              "version": "17.3.1"
            },
            {
              "status": "affected",
              "version": "17.3.2"
            },
            {
              "status": "affected",
              "version": "17.3.3"
            },
            {
              "status": "affected",
              "version": "17.3.1a"
            },
            {
              "status": "affected",
              "version": "17.3.1w"
            },
            {
              "status": "affected",
              "version": "17.3.2a"
            },
            {
              "status": "affected",
              "version": "17.3.1x"
            },
            {
              "status": "affected",
              "version": "17.3.1z"
            },
            {
              "status": "affected",
              "version": "17.3.4"
            },
            {
              "status": "affected",
              "version": "17.3.5"
            },
            {
              "status": "affected",
              "version": "17.3.4a"
            },
            {
              "status": "affected",
              "version": "17.3.6"
            },
            {
              "status": "affected",
              "version": "17.3.4b"
            },
            {
              "status": "affected",
              "version": "17.3.4c"
            },
            {
              "status": "affected",
              "version": "17.3.5a"
            },
            {
              "status": "affected",
              "version": "17.3.5b"
            },
            {
              "status": "affected",
              "version": "17.3.7"
            },
            {
              "status": "affected",
              "version": "17.3.8"
            },
            {
              "status": "affected",
              "version": "17.3.8a"
            },
            {
              "status": "affected",
              "version": "17.4.1"
            },
            {
              "status": "affected",
              "version": "17.4.2"
            },
            {
              "status": "affected",
              "version": "17.4.1a"
            },
            {
              "status": "affected",
              "version": "17.4.1b"
            },
            {
              "status": "affected",
              "version": "17.4.2a"
            },
            {
              "status": "affected",
              "version": "17.5.1"
            },
            {
              "status": "affected",
              "version": "17.5.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.1w"
            },
            {
              "status": "affected",
              "version": "17.6.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1x"
            },
            {
              "status": "affected",
              "version": "17.6.3"
            },
            {
              "status": "affected",
              "version": "17.6.1y"
            },
            {
              "status": "affected",
              "version": "17.6.1z"
            },
            {
              "status": "affected",
              "version": "17.6.3a"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.6.1z1"
            },
            {
              "status": "affected",
              "version": "17.6.5"
            },
            {
              "status": "affected",
              "version": "17.6.6"
            },
            {
              "status": "affected",
              "version": "17.6.6a"
            },
            {
              "status": "affected",
              "version": "17.6.5a"
            },
            {
              "status": "affected",
              "version": "17.7.1"
            },
            {
              "status": "affected",
              "version": "17.7.1a"
            },
            {
              "status": "affected",
              "version": "17.7.1b"
            },
            {
              "status": "affected",
              "version": "17.7.2"
            },
            {
              "status": "affected",
              "version": "17.10.1"
            },
            {
              "status": "affected",
              "version": "17.10.1a"
            },
            {
              "status": "affected",
              "version": "17.10.1b"
            },
            {
              "status": "affected",
              "version": "17.8.1"
            },
            {
              "status": "affected",
              "version": "17.8.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1"
            },
            {
              "status": "affected",
              "version": "17.9.1w"
            },
            {
              "status": "affected",
              "version": "17.9.2"
            },
            {
              "status": "affected",
              "version": "17.9.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1x"
            },
            {
              "status": "affected",
              "version": "17.9.1y"
            },
            {
              "status": "affected",
              "version": "17.9.3"
            },
            {
              "status": "affected",
              "version": "17.9.2a"
            },
            {
              "status": "affected",
              "version": "17.9.1x1"
            },
            {
              "status": "affected",
              "version": "17.9.3a"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.9.1y1"
            },
            {
              "status": "affected",
              "version": "17.9.5"
            },
            {
              "status": "affected",
              "version": "17.9.4a"
            },
            {
              "status": "affected",
              "version": "17.9.5a"
            },
            {
              "status": "affected",
              "version": "17.9.5b"
            },
            {
              "status": "affected",
              "version": "17.11.1"
            },
            {
              "status": "affected",
              "version": "17.11.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1"
            },
            {
              "status": "affected",
              "version": "17.12.1w"
            },
            {
              "status": "affected",
              "version": "17.12.1a"
            },
            {
              "status": "affected",
              "version": "17.12.2"
            },
            {
              "status": "affected",
              "version": "17.12.2a"
            },
            {
              "status": "affected",
              "version": "17.13.1"
            },
            {
              "status": "affected",
              "version": "17.13.1a"
            },
            {
              "status": "affected",
              "version": "17.11.99SW"
            }
          ]
        },
        {
          "product": "Cisco IOS XE Catalyst SD-WAN",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "17.5.1a"
            },
            {
              "status": "affected",
              "version": "17.6.1a"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.7.1a"
            },
            {
              "status": "affected",
              "version": "17.9.1a"
            },
            {
              "status": "affected",
              "version": "17.9.2a"
            },
            {
              "status": "affected",
              "version": "17.9.3a"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.8.1a"
            },
            {
              "status": "affected",
              "version": "17.10.1a"
            },
            {
              "status": "affected",
              "version": "17.11.1a"
            },
            {
              "status": "affected",
              "version": "17.12.1a"
            },
            {
              "status": "affected",
              "version": "17.13.1a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-371",
              "description": "State Issues",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-25T16:27:24.944Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-sdwan-utd-dos-hDATqxs",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sdwan-utd-dos-hDATqxs",
        "defects": [
          "CSCwi07137"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20455",
    "datePublished": "2024-09-25T16:18:50.066Z",
    "dateReserved": "2023-11-08T15:08:07.679Z",
    "dateUpdated": "2024-09-25T19:47:05.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20035 (GCVE-0-2023-20035)

Vulnerability from nvd – Published: 2023-03-23 00:00 – Updated: 2024-10-28 16:32
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20230322 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20035",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-28T16:19:23.522101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T16:32:57.941Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software ",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2023-03-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-146",
              "description": "CWE-146",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-23T00:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20230322 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ios-xe-sdwan-VQAhEjYw",
        "defect": [
          [
            "CSCvx72976",
            "CSCwc41942"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20035",
    "datePublished": "2023-03-23T00:00:00",
    "dateReserved": "2022-10-27T00:00:00",
    "dateUpdated": "2024-10-28T16:32:57.941Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20850 (GCVE-0-2022-20850)

Vulnerability from nvd – Published: 2022-09-30 18:46 – Updated: 2024-11-01 18:50
VLAI?
Summary
A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:50.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220928 Cisco SD-WAN Arbitrary File Deletion Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20850",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-01T18:40:31.320155Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-01T18:50:42.028Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco SD-WAN Solution",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-09-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-30T18:46:05",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220928 Cisco SD-WAN Arbitrary File Deletion Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
        }
      ],
      "source": {
        "advisory": "cisco-sa-arb-file-delete-VB2rVcQv",
        "defect": [
          [
            "CSCvm25943"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco SD-WAN Arbitrary File Deletion Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-09-28T16:00:00",
          "ID": "CVE-2022-20850",
          "STATE": "PUBLIC",
          "TITLE": "Cisco SD-WAN Arbitrary File Deletion Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco SD-WAN Solution",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.5",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-22"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220928 Cisco SD-WAN Arbitrary File Deletion Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-arb-file-delete-VB2rVcQv",
          "defect": [
            [
              "CSCvm25943"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20850",
    "datePublished": "2022-09-30T18:46:05.246074Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-01T18:50:42.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1529 (GCVE-0-2021-1529)

Vulnerability from nvd – Published: 2021-10-21 02:45 – Updated: 2024-11-07 21:47
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:17.673Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20211020 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1529",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:42:50.706618Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T21:47:38.698Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE SD-WAN Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-10-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-21T02:45:10",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20211020 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sd-wan-rhpbE34A",
        "defect": [
          [
            "CSCvx50713"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-10-20T16:00:00",
          "ID": "CVE-2021-1529",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE SD-WAN Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20211020 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-sd-wan-rhpbE34A",
          "defect": [
            [
              "CSCvx50713"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1529",
    "datePublished": "2021-10-21T02:45:10.183174Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T21:47:38.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1619 (GCVE-0-2021-1619)

Vulnerability from nvd – Published: 2021-09-23 02:30 – Updated: 2024-11-07 21:57
VLAI?
Summary
A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:18:11.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1619",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:55:52.696954Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T21:57:46.001Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-09-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-824",
              "description": "CWE-824",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-23T02:30:55",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
        }
      ],
      "source": {
        "advisory": "cisco-sa-aaa-Yx47ZT8Q",
        "defect": [
          [
            "CSCvt53563"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-09-22T16:00:00",
          "ID": "CVE-2021-1619",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "9.8",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-824"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-aaa-Yx47ZT8Q",
          "defect": [
            [
              "CSCvt53563"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1619",
    "datePublished": "2021-09-23T02:30:56.078204Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T21:57:46.001Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34729 (GCVE-0-2021-34729)

Vulnerability from nvd – Published: 2021-09-23 02:26 – Updated: 2024-11-07 21:58
VLAI?
Summary
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:19:48.140Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210922 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34729",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:43:01.874543Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T21:58:26.237Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE SD-WAN Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-09-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-23T02:26:36",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210922 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ioxesdwan-clicmdinj-7bYX5k3",
        "defect": [
          [
            "CSCvw54120"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-09-22T16:00:00",
          "ID": "CVE-2021-34729",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE SD-WAN Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.7",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210922 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-ioxesdwan-clicmdinj-7bYX5k3",
          "defect": [
            [
              "CSCvw54120"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-34729",
    "datePublished": "2021-09-23T02:26:36.609998Z",
    "dateReserved": "2021-06-15T00:00:00",
    "dateUpdated": "2024-11-07T21:58:26.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}