All the vulnerabilites related to cisco - ip_phone_6861
cve-2022-20774
Vulnerability from cvelistv5
Published
2022-04-06 18:12
Modified
2024-11-06 16:28
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 7800 Series with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:49.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220406 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20774", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:59:08.204328Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:28:57.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T18:12:22", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220406 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ], "source": { "advisory": "cisco-sa-voip-phone-csrf-K56vXvVx", "defect": [ [ "CSCvz56447" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-06T23:00:00", "ID": "CVE-2022-20774", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.8", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345" } ] } ] }, "references": { "reference_data": [ { "name": "20220406 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ] }, "source": { "advisory": "cisco-sa-voip-phone-csrf-K56vXvVx", "defect": [ [ "CSCvz56447" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20774", "datePublished": "2022-04-06T18:12:26.733091Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:28:57.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20078
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-10-28 16:33
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20078", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:27:17.404874Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:33:46.026Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-03T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "source": { "advisory": "cisco-sa-ip-phone-cmd-inj-KMFynVcP", "defect": [ [ "CSCwc78400", "CSCwd39132", "CSCwd40474", "CSCwd40489", "CSCwd40494" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20078", "datePublished": "2023-03-03T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:33:46.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26139
Vulnerability from cvelistv5
Published
2021-05-11 19:37
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:09:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26139", "datePublished": "2021-05-11T19:37:55", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3111
Vulnerability from cvelistv5
Published
2020-02-05 17:40
Modified
2024-11-15 17:42
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP phone |
Version: unspecified < 12.7(1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:24:00.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3111", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:25:09.510937Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:42:42.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP phone", "vendor": "Cisco", "versions": [ { "lessThan": "12.7(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about this vulnerability. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:06:07", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ], "source": { "advisory": "cisco-sa-20200205-voip-phones-rce-dos", "defect": [ [ "CSCvr96057", "CSCvr96058", "CSCvr96059", "CSCvr96060", "CSCvr96063", "CSCvr96064", "CSCvr96065", "CSCvr96066", "CSCvr96067", "CSCvr96069", "CSCvr96070", "CSCvr96071", "CSCvr96738", "CSCvr96739" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-02-05T16:00:00-0800", "ID": "CVE-2020-3111", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP phone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "12.7(1)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about this vulnerability. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] }, "source": { "advisory": "cisco-sa-20200205-voip-phones-rce-dos", "defect": [ [ "CSCvr96057", "CSCvr96058", "CSCvr96059", "CSCvr96060", "CSCvr96063", "CSCvr96064", "CSCvr96065", "CSCvr96066", "CSCvr96067", "CSCvr96069", "CSCvr96070", "CSCvr96071", "CSCvr96738", "CSCvr96739" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3111", "datePublished": "2020-02-05T17:40:15.678994Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:42:42.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24587
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-01T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "url": "https://www.fragattacks.com" }, { "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24587", "datePublished": "2021-05-11T00:00:00", "dateReserved": "2020-08-21T00:00:00", "dateUpdated": "2024-08-04T15:19:08.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16008
Vulnerability from cvelistv5
Published
2020-01-26 04:45
Modified
2024-11-15 17:44
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 7800 Series with Multiplatform Firmware |
Version: unspecified < n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200108 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-16008", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:29:41.207109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:44:17.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-26T04:45:30", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200108 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ], "source": { "advisory": "cisco-sa-20200108-iphone-xss", "defect": [ [ "CSCvq85331" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-01-08T16:00:00-0800", "ID": "CVE-2019-16008", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20200108 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ] }, "source": { "advisory": "cisco-sa-20200108-iphone-xss", "defect": [ [ "CSCvq85331" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-16008", "datePublished": "2020-01-26T04:45:30.615870Z", "dateReserved": "2019-09-06T00:00:00", "dateUpdated": "2024-11-15T17:44:17.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26141
Vulnerability from cvelistv5
Published
2021-05-11 19:42
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:13:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26141", "datePublished": "2021-05-11T19:42:11", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20079
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-10-28 16:33
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20079", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:27:14.331307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:33:33.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-03T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "source": { "advisory": "cisco-sa-ip-phone-cmd-inj-KMFynVcP", "defect": [ [ "CSCwc78400", "CSCwd39132", "CSCwd40474", "CSCwd40489", "CSCwd40494" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20079", "datePublished": "2023-03-03T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:33:33.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24588
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-01T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "url": "https://www.fragattacks.com" }, { "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24588", "datePublished": "2021-05-11T00:00:00", "dateReserved": "2020-08-21T00:00:00", "dateUpdated": "2024-08-04T15:19:08.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20221
Vulnerability from cvelistv5
Published
2023-08-16 21:01
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: 11.3.1 MSR2-6 Version: 11.3.1 MSR3-3 Version: 11.3.2 Version: 11.3.3 Version: 11.3.4 Version: 11.3.5 Version: 11.3.3 MSR1 Version: 11.3.6 Version: 11-3-1MPPSR4UPG Version: 11.3.7 Version: 11-3-1MSR2UPG Version: 11.3.6SR1 Version: 11.3.7SR1 Version: 11.3.7SR2 Version: 11.0.0 Version: 11.0.1 Version: 11.0.1 MSR1-1 Version: 11.0.2 Version: 11.1.1 Version: 11.1.1 MSR1-1 Version: 11.1.1 MSR2-1 Version: 11.1.2 Version: 11.1.2 MSR1-1 Version: 11.1.2 MSR3-1 Version: 11.2.1 Version: 11.2.2 Version: 11.2.3 Version: 11.2.3 MSR1-1 Version: 11.2.4 Version: 11.3.1 Version: 11.3.1 MSR1-3 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ipphone-csrf-HOCmXW2c", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.3.1 MSR2-6" }, { "status": "affected", "version": "11.3.1 MSR3-3" }, { "status": "affected", "version": "11.3.2" }, { "status": "affected", "version": "11.3.3" }, { "status": "affected", "version": "11.3.4" }, { "status": "affected", "version": "11.3.5" }, { "status": "affected", "version": "11.3.3 MSR1" }, { "status": "affected", "version": "11.3.6" }, { "status": "affected", "version": "11-3-1MPPSR4UPG" }, { "status": "affected", "version": "11.3.7" }, { "status": "affected", "version": "11-3-1MSR2UPG" }, { "status": "affected", "version": "11.3.6SR1" }, { "status": "affected", "version": "11.3.7SR1" }, { "status": "affected", "version": "11.3.7SR2" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.1 MSR1-1" }, { "status": "affected", "version": "11.0.2" }, { "status": "affected", "version": "11.1.1" }, { "status": "affected", "version": "11.1.1 MSR1-1" }, { "status": "affected", "version": "11.1.1 MSR2-1" }, { "status": "affected", "version": "11.1.2" }, { "status": "affected", "version": "11.1.2 MSR1-1" }, { "status": "affected", "version": "11.1.2 MSR3-1" }, { "status": "affected", "version": "11.2.1" }, { "status": "affected", "version": "11.2.2" }, { "status": "affected", "version": "11.2.3" }, { "status": "affected", "version": "11.2.3 MSR1-1" }, { "status": "affected", "version": "11.2.4" }, { "status": "affected", "version": "11.3.1" }, { "status": "affected", "version": "11.3.1 MSR1-3" } ] }, { "product": "Cisco PhoneOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:23.679Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ipphone-csrf-HOCmXW2c", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" } ], "source": { "advisory": "cisco-sa-ipphone-csrf-HOCmXW2c", "defects": [ "CSCwc78409", "CSCwc81103", "CSCwc78412" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20221", "datePublished": "2023-08-16T21:01:05.872Z", "dateReserved": "2022-10-27T18:47:50.368Z", "dateUpdated": "2024-08-02T09:05:35.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26140
Vulnerability from cvelistv5
Published
2021-05-11 19:34
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:11:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26140", "datePublished": "2021-05-11T19:34:42", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2C083CF-3D4D-4AF0-8461-835F6AC264CC", "versionEndExcluding": "4.4.271", "versionStartIncluding": "4.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "11580478-2F79-45B8-9BC0-FEF28259A4F5", "versionEndExcluding": "4.9.271", "versionStartIncluding": "4.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E", "versionEndExcluding": "4.14.235", "versionStartIncluding": "4.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", "versionEndExcluding": "4.19.193", "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", "versionEndExcluding": "5.4.124", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", "versionEndExcluding": "5.10.42", "versionStartIncluding": "5.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", "versionEndExcluding": "5.12.9", "versionStartIncluding": "5.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed." }, { "lang": "es", "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que todos los fragmentos de una trama est\u00e9n cifrados con la misma clave. Un adversario puede abusar de esto para descifrar fragmentos seleccionados cuando otro dispositivo env\u00eda tramas fragmentadas y la clave de cifrado WEP, CCMP o GCMP es peri\u00f3dicamente renovada" } ], "id": "CVE-2020-24587", "lastModified": "2024-11-21T05:15:05.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.2, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", "matchCriteriaId": "5F2558DF-2D1F-46BA-ABF1-08522D33268E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "68C08ECE-4D09-4E57-920B-B8E94E81603A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F5154A83-2499-4756-9150-8BFD9ACEF583", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "7CC235C6-63B1-4085-B9AA-47EFB17A144D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "54C41A49-87FA-4C98-8321-2808712B2F68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F8ED25D1-973F-481A-8550-16508F73D2D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "35918620-E4C5-4E46-A5A9-63009333667A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "27440732-54F0-40DF-9896-88D60ABC568A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", "matchCriteriaId": "FC39A276-532B-428A-83BA-141B626281A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "93103556-6C4A-4D35-91D1-5CDCDC740655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5DEFC044-1D95-4386-AABB-ADE1099E3F85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "42759A0F-70C6-41DB-9DF9-2BC05685F678", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "95662406-0D7D-45B2-95F5-582FA275AC89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "A0E9FB66-F577-4744-B51F-3BD25293109F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "079DA749-0B94-4CCF-A3B1-7669DA213B52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D96A05C3-1549-47DD-BADA-7872246EBDA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "2E7375AB-BE32-4879-BB54-CF5EDAB98188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0E9E26B8-1539-4E21-AEAA-45095F79382A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "19C73CA1-2F92-4635-8D38-812D6D8ACD89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "EA17907A-388A-42E7-ACC6-2F59C72C93F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "A53A71EB-C346-42CD-AD58-F83F809D0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "90E87633-CD6E-439B-9CE8-66A1E414F09D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "742D9262-4329-4F0A-B97E-5FC65786946F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "FC14C45F-FDFB-4AAC-94EC-45860051379F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "C01E79D8-5F48-4939-BFD6-B363A76769D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CEE50FA1-6616-402A-9D86-9725206612C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5B907930-CA5C-4160-A3D1-8ACB559C9143", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "9331282F-B426-40DC-869E-F6F7DFE959A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "C67D4B91-66EB-490E-B43D-A7E159CC543B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "45A6A314-804B-47DC-B35E-804AD89588D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "968D60A4-036A-4792-BE8E-88F8B26444DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "754B93BA-0451-4C09-A124-284A62189D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "85293635-DD43-4651-8605-4F27F228AA91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "826FB2F4-45B5-4360-B577-11F75A1B67A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F3417E19-D7FC-487D-B316-B826DB3CB712", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "B66B6DB7-E48C-4758-915E-E4096CC5D68E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "69C3A33C-85E1-4157-81F7-39FA271CF8ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "E65FB9EC-A750-44C9-B251-5D8697C29EC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7948D988-3ED9-49BE-B820-15728DA93D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B465A44-EC90-41C6-BD9B-59D3B7E49540", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", "matchCriteriaId": "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA329302-48FE-43FB-A15D-C3BEFB5AE868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", "matchCriteriaId": "37055F7B-2F2A-4B80-AC34-CAB0568BC692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534CF2AE-2149-4599-AC43-13EE8048B3EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB15599-F795-4D24-A4A6-CD826F6A7A13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "441DF280-FC8C-481F-BDB9-7D757CF5BB72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "52BB9046-E47D-480A-93D2-DB0F76574E02", "versionEndExcluding": "4.4.271", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C01BF34A-CD21-4B2F-9877-C89B8202B09A", "versionEndExcluding": "4.9.271", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E", "versionEndExcluding": "4.14.235", "versionStartIncluding": "4.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", "versionEndExcluding": "4.19.193", "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", "versionEndExcluding": "5.4.124", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", "versionEndExcluding": "5.10.42", "versionStartIncluding": "5.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", "versionEndExcluding": "5.12.9", "versionStartIncluding": "5.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets." }, { "lang": "es", "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que el flag A-MSDU en el campo de encabezado QoS de texto plano est\u00e9 autenticada. Contra dispositivos que admiten la recepci\u00f3n de tramas A-MSDU que no son SSP (que es obligatorio como parte de 802.11n), un adversario puede abusar de esto para inyectar paquetes de red arbitrarios" } ], "id": "CVE-2020-24588", "lastModified": "2024-11-21T05:15:05.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-03 16:15
Modified
2024-11-21 07:40
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FB46C93-0E51-42F3-8F94-40042A5CBF46", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AD2F635-094B-4883-BF55-B85B16AD773F", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BA7B78-4934-404F-B4DF-6C936460E05E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "470A77FC-6DD6-44B8-B332-79844AE06BB2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CB8846B-6B42-49AF-BFC9-85CF89CA4E56", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F675EDC-3F39-4BDA-B6BD-2A0C1075D1D8", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D9466BE-960D-41DD-A137-ABE2C3F6D4B4", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27EA4CE-9BA5-42B8-B1CE-5710A6207CC2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4550A390-A8D8-4857-8C66-EC6B1F8E322E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D975C4C2-9567-4F5C-BE6A-137AE321F9F0", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD1967-D870-4E21-BF1C-D712809077EB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACB956C5-4165-4C00-BC5C-F4D4C6270070", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E1D601-371E-4F90-B6F7-8A6B91C949AB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C4C70C3-D9D7-468C-B522-666EF6C01D20", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7609CA0-F9E8-47AB-A621-212DC124018E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D936075-78C7-4E1E-A2B1-1EB8B668E3F2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2691AABE-6E0A-422B-88B9-89E63D1436F3", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6579DD70-1AC9-42FC-9464-90523A7008E7", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7945g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E49D5D04-A5B9-461D-94A3-15676DD90CD6", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5980E646-CA07-4222-A9DD-A71306A4A678", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7965g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0587084E-0B87-46D3-A5D8-3FD7EBC826E1", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF30D1CC-D27F-49FF-9C63-BB890002D1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7975g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77D2870-D2C9-40D7-8877-F9E9AD4E1DF8", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA879B6-04D6-402A-8F38-8A7CB34D76F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "id": "CVE-2023-20079", "lastModified": "2024-11-21T07:40:30.230", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-03T16:15:10.380", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A99D021-C66D-4FA2-B33C-4DAADBB6B431", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el kernel en NetBSD versi\u00f3n 7.1. Un punto de acceso (AP) reenv\u00eda tramas EAPOL a otros clientes aunque el remitente a\u00fan no se haya autenticado con \u00e9xito en el AP. Esto podr\u00eda ser abusado en redes Wi-Fi proyectadas para lanzar ataques de denegaci\u00f3n de servicio contra clientes conectados y facilitar la explotaci\u00f3n de otras vulnerabilidades en clientes conectados" } ], "id": "CVE-2020-26139", "lastModified": "2024-11-21T05:19:20.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.647", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", "matchCriteriaId": "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0F9200-8AFD-4100-AF39-49476298C0E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "68C08ECE-4D09-4E57-920B-B8E94E81603A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F5154A83-2499-4756-9150-8BFD9ACEF583", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "7CC235C6-63B1-4085-B9AA-47EFB17A144D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "54C41A49-87FA-4C98-8321-2808712B2F68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F8ED25D1-973F-481A-8550-16508F73D2D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "35918620-E4C5-4E46-A5A9-63009333667A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "27440732-54F0-40DF-9896-88D60ABC568A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", "matchCriteriaId": "FC39A276-532B-428A-83BA-141B626281A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "93103556-6C4A-4D35-91D1-5CDCDC740655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5DEFC044-1D95-4386-AABB-ADE1099E3F85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "42759A0F-70C6-41DB-9DF9-2BC05685F678", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "95662406-0D7D-45B2-95F5-582FA275AC89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "A0E9FB66-F577-4744-B51F-3BD25293109F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "079DA749-0B94-4CCF-A3B1-7669DA213B52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D96A05C3-1549-47DD-BADA-7872246EBDA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "2E7375AB-BE32-4879-BB54-CF5EDAB98188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0E9E26B8-1539-4E21-AEAA-45095F79382A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "19C73CA1-2F92-4635-8D38-812D6D8ACD89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "EA17907A-388A-42E7-ACC6-2F59C72C93F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "A53A71EB-C346-42CD-AD58-F83F809D0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "90E87633-CD6E-439B-9CE8-66A1E414F09D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "742D9262-4329-4F0A-B97E-5FC65786946F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "FC14C45F-FDFB-4AAC-94EC-45860051379F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "C01E79D8-5F48-4939-BFD6-B363A76769D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CEE50FA1-6616-402A-9D86-9725206612C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5B907930-CA5C-4160-A3D1-8ACB559C9143", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "9331282F-B426-40DC-869E-F6F7DFE959A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "C67D4B91-66EB-490E-B43D-A7E159CC543B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "45A6A314-804B-47DC-B35E-804AD89588D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "968D60A4-036A-4792-BE8E-88F8B26444DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "754B93BA-0451-4C09-A124-284A62189D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "85293635-DD43-4651-8605-4F27F228AA91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "826FB2F4-45B5-4360-B577-11F75A1B67A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F3417E19-D7FC-487D-B316-B826DB3CB712", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "B66B6DB7-E48C-4758-915E-E4096CC5D68E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "69C3A33C-85E1-4157-81F7-39FA271CF8ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "E65FB9EC-A750-44C9-B251-5D8697C29EC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7948D988-3ED9-49BE-B820-15728DA93D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B465A44-EC90-41C6-BD9B-59D3B7E49540", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", "matchCriteriaId": "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA329302-48FE-43FB-A15D-C3BEFB5AE868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", "matchCriteriaId": "37055F7B-2F2A-4B80-AC34-CAB0568BC692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534CF2AE-2149-4599-AC43-13EE8048B3EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB15599-F795-4D24-A4A6-CD826F6A7A13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "441DF280-FC8C-481F-BDB9-7D757CF5BB72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA6EF369-8D83-4F5D-BDBE-99E89AD84810", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", "matchCriteriaId": "8191FD87-4E55-4F38-8DB0-7E6772AD075B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD5327-F3F8-4D0A-B6DC-2F11DF2E6866", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D717945-EE41-4D0F-86EF-90826EBE9C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "893D104F-6711-46F9-804C-4B57562166E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", "matchCriteriaId": "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4AABCC2-D2A5-4A89-9DF9-6F80EB871CC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D27AB201-342D-4517-9E05-6088598F4695", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw-6300-con-x-k9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90A743E4-1302-4DAB-9300-65D8F468C8F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED3625BC-9003-4E07-B4EA-EB44CADDD6B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el controlador ALFA de Windows 10 versi\u00f3n 6.1316.1209 para AWUS036H. Las implementaciones WEP, WPA, WPA2 y WPA3 aceptan tramas de texto plano en una red Wi-Fi protegida. Un adversario puede abusar de esto para inyectar tramas de datos arbitrarias independientes de la configuraci\u00f3n de la red" } ], "id": "CVE-2020-26140", "lastModified": "2024-11-21T05:19:20.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-06 19:15
Modified
2024-11-21 06:43
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "745C0AD1-4738-4A2B-B767-8C6D402907CE", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3914860E-9A39-48B4-AA57-B5870257278E", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27D37F4D-3B54-4387-9521-D226CBC22279", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "06C3D2BD-9EB3-4F9E-B060-38673B677E0C", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E1C6911-CE2A-42CE-ACFA-B98C79FBFD5A", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CBA15DB-CC71-4819-AF7C-88510535D5F8", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4F500A7-1C69-4333-8DE7-1FCC47292D86", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED2EC67-3904-493E-A08B-0B54D7599019", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4376CE72-90FE-4EE8-B950-B2D290E2E4EF", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "447A2AB2-175B-47E8-A65A-5F82D7A1C67B", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5624060-A2AE-4D80-BD6D-C08B3212BBC8", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8CE676-F371-4903-95F9-5309B1EDBCA0", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF0420D7-0F7C-4E8A-9634-116703A3EEBE", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "967AA76F-1F6D-40DB-9B07-4AE76FF68AB0", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C66C67B-22FD-419B-83EC-733C13659D36", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EA13ABB-5A46-41FC-910F-638C68AFF197", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECDBA5D-D5EB-43A3-B7C6-2C01DF40896E", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los tel\u00e9fonos IP de las series 6800, 7800 y 8800 de Cisco con firmware multiplataforma podr\u00eda permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site request forgery (CSRF) contra un usuario de la interfaz basada en la web de un sistema afectado. Esta vulnerabilidad es debido a unas protecciones insuficientes de tipo CSRF para la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al persuadir a un usuario autenticado de la interfaz para que siga un enlace dise\u00f1ado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante llevar a cabo cambios de configuraci\u00f3n en el dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)" } ], "id": "CVE-2022-20774", "lastModified": "2024-11-21T06:43:31.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-06T19:15:08.377", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-26 05:15
Modified
2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "166FA402-36FC-4853-9667-FE2D823CB218", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A19E9296-28D5-4922-8522-C38B9D522240", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877D9E1B-453D-48FF-A28D-DFC936D296EE", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D92B14E-F15E-4FD1-9F2D-8B892554D6A2", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF9F28F9-D2BB-4CF9-A5BF-C25202C4282B", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EA36D63-F76C-47B1-B768-D9C00D4968BC", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBC3FE66-F02F-4220-AA16-47C9D42982D5", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A77BB6CB-C596-48B8-9638-B672C7179652", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7710A8E4-F4B6-457D-8CA2-58D0BEA42750", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BAF32A-C71B-453B-A49D-7A6EF37DA9EB", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "851FB717-E6D7-4048-A9C9-E89C63E0FDEF", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4976CA9B-8594-4DEA-B539-7EEF18BB74A6", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98DB6A45-AA2B-4F91-A838-7F2327222FA5", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C7BCAF1-D517-4D34-BE46-54A60A97BFBD", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD5C830C-2D92-4D90-9F79-3B39FC0DF987", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F81D33E-85E1-4C57-B4EF-F46BFC3163B7", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1B92B44-6799-4CF0-A8CD-9971E6B01EC7", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01BDA3DE-1262-4081-9C64-4E2DB1EF15CA", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B85A8BA-B2A0-4F9B-BD79-CDBDE29A0530", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la GUI basada en web de Cisco IP Phone Serie 6800, 7800 y 8800 con Multiplatform Firmware, podr\u00eda permitir a un atacante remoto autenticado llevar a cabo un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz basada en web de un sistema afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por parte del usuario mediante la GUI basada en web de un sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al persuadir a un usuario de la interfaz para que haga clic en un enlace dise\u00f1ado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2019-16008", "lastModified": "2024-11-21T04:29:55.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-26T05:15:14.130", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-03 16:15
Modified
2024-11-21 07:40
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FB46C93-0E51-42F3-8F94-40042A5CBF46", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AD2F635-094B-4883-BF55-B85B16AD773F", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BA7B78-4934-404F-B4DF-6C936460E05E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "470A77FC-6DD6-44B8-B332-79844AE06BB2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CB8846B-6B42-49AF-BFC9-85CF89CA4E56", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F675EDC-3F39-4BDA-B6BD-2A0C1075D1D8", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D9466BE-960D-41DD-A137-ABE2C3F6D4B4", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27EA4CE-9BA5-42B8-B1CE-5710A6207CC2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4550A390-A8D8-4857-8C66-EC6B1F8E322E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D975C4C2-9567-4F5C-BE6A-137AE321F9F0", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD1967-D870-4E21-BF1C-D712809077EB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACB956C5-4165-4C00-BC5C-F4D4C6270070", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E1D601-371E-4F90-B6F7-8A6B91C949AB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C4C70C3-D9D7-468C-B522-666EF6C01D20", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7609CA0-F9E8-47AB-A621-212DC124018E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D936075-78C7-4E1E-A2B1-1EB8B668E3F2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2691AABE-6E0A-422B-88B9-89E63D1436F3", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "id": "CVE-2023-20078", "lastModified": "2024-11-21T07:40:30.083", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-03T16:15:10.277", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", "matchCriteriaId": "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0F9200-8AFD-4100-AF39-49476298C0E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AED716A-D252-4FE8-ABE7-57D2AB3682ED", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "518B205F-78E7-48AD-A520-A799FCE11772", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12785A53-15D1-46F4-8F51-2DE8B91C5EEA", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C22FD7BD-450D-4F81-AD5A-4CFD898EC86A", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22306637-577A-48D0-840B-9BD36D116D6E", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49C36428-65A0-4CA9-A0D3-093547A5A713", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "676032C5-EE2F-4B58-BD5E-AA626E6B0C3D", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A55C08-73C3-42E7-86EE-A69DE10C2E8C", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "630DCA1A-4F22-4F17-9205-6BFB0276B98A", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A323D6A6-386D-4CBD-B447-2EB18339F6CC", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6560ADD7-3655-4A85-A24E-1A9CC132C6AD", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F285B53-44CE-4158-A773-99F799F6CBCB", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D645D23-2B8F-4AC4-89BA-E070F3292958", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E1419FD-D693-42A5-ABC1-0539FB8BAD67", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39D18FA7-E7D6-4F1C-BDE0-EB9526857BAD", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FE9C2A6-22E8-43A1-9936-EE65C0A342D3", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "092DA889-B167-41F3-81D7-B2F5BE7B99AF", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A563D688-3994-4A14-AAEA-A45525D4C380", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC333668-F713-4E20-97A6-A2192BF34964", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02148C0F-306F-4700-8657-45134F43E2C4", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C4F44A-8E87-403B-BAD9-E6D6557496CB", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BEF9B49-78E7-49C8-BADD-933EA12EA168", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DE98041-599C-4B5E-9C52-234BA84E2731", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEF2C9C-2F99-49C9-95B8-93B0BDE5D777", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr18:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EC44D14-CF82-4C9A-A399-A3B7168F1F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A2E923-646F-4581-BE93-FBB3BD1A9814", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45A20191-7126-4B98-951F-2ACC03AAC227", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51590073-ACF5-42CC-9765-7DD358E03D40", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42F88F22-B587-44C9-A0A3-70EBDE310932", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "893DB2E2-505C-45A4-8CD0-A911DC6F8C39", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB69DA2F-0922-4FF4-B199-57F9C2E804B4", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2274DBC-9BA6-4430-9E88-05027947FCBF", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56D2B98B-9080-4DD2-841F-664EDE48D843", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D7F4EB0-2C74-4045-B5A5-9D71A8BCC8C9", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7855CB23-DD12-499A-B684-3FB3C893A809", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47E66153-A0EE-49F7-B168-C953E390214E", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A69E5B-2C69-4769-94EE-02C70F270928", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85AD2B76-0B4E-434D-89F3-690E13B61B3B", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42B92043-5436-4CA1-A297-DE88A5631BDC", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A19DB2-1E3A-40AC-B265-878E9B568E8C", "versionEndExcluding": "11.0\\(6\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B261F994-59CA-45F1-ACAC-8F4E93C94C64", "versionEndExcluding": "11.3\\(5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:3pcc:*:*", "matchCriteriaId": "13D13E34-A8AA-46F4-A0E3-E79D4513EFFA", "versionEndExcluding": "11.3\\(5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:3pcc:*:*", "matchCriteriaId": "77FC1162-9241-4605-8E0A-F9AC7F5F94E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E3B94C-BA7B-481A-AF4D-2FCF5E81D7B6", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9A7F857-A3D7-43DA-8E94-FDA0EE542C39", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B9BC28D-0BC0-45CB-A87B-59F407F3A210", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F052EA74-DB34-4FF0-9A55-4E117CAF7765", "versionEndExcluding": "1.2\\(0\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "0872EA42-38A9-45A5-94A6-747FEEE0E1D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_desk_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A0DD3DA-5B3D-4435-990B-FF181130788B", "versionEndExcluding": "1.2\\(0\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_desk_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "14038A41-2C6F-4A1E-85A1-8692B9633C8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75ED1FFC-A550-4F59-B4AE-FE8B0261E1AE", "versionEndExcluding": "10.8.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBE3BDBD-4D85-4C2E-B02E-D7D71331AFC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_wireless_phone_860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C80751CD-A4EE-45F5-83B3-E5D24C274B98", "versionEndExcluding": "1.4\\(0\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_wireless_phone_860:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC3CC529-4C57-4A21-8936-FD4222F2D350", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_wireless_phone_840_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "336CF15F-5AD9-41FD-8606-1531F37FBE1E", "versionEndExcluding": "1.4\\(0\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_wireless_phone_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "922CC404-372F-4F14-B820-67473C0938FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D5BDAE9A-9065-4CAE-8031-D294F31E2946", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "B6D89D68-199F-42E2-84D0-97D3FF59F05F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0E2D01D5-2DE9-4AD9-93D9-9C44F08B2BEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "21A17252-75C3-46B4-927A-124354169DC8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5721-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5A333C23-A56B-48F6-992E-3BF0BD93F730", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5721-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F941751F-76BB-4B0B-88B6-CFDBEA4FC2A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "867FE297-7913-43B1-AFF5-A4345FE7DF62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5721-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EB4AEAD7-F842-4E6E-9F44-73356C1874AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5722-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "840CD560-0324-41FB-B51E-77AEEEDC86BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5722-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "B9CFC662-6AA7-4528-B7DF-1ABF16DF0DAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5722-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2EB47ED3-1063-4A3F-B4BB-8671CE96E0B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5722-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "664E9B08-2FA7-4257-B4DA-E3BB510E1E7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5722-1fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "E7DCBC95-FEC1-40B3-A81D-179FC97EFEBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5722-1fc00-0ac0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "626DA25C-2DCA-4BFD-8A55-85BD1321D79F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EF32DD9B-2036-49AD-9547-956CAE3CD785", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "54DFFDC5-6BB7-4C97-B531-E6FD3CC7A533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "4B303C52-44D8-4AA6-87C7-2659F7C1610E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0aa6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "7F935667-D4C4-45BE-9D39-9B7A40BD80A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "FF6314D0-5604-4CD1-8C5F-134AC492483E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5F103B12-A8CD-4B32-BFE3-940E3B4E7317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5B894E95-F49A-42ED-888D-4727F41F1A63", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0ab6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "6F7BFBE4-92CA-4D23-8136-605C83B7E66C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5738-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F083F822-DDE4-4D14-81F0-4EFD60DB13CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5738-1gy00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "377B769F-0394-4E64-BF82-AAB8ADE562B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5738-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "8BB35C1E-C9E7-4803-9AC1-ADFCBCA1052E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5738-1gy00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "49160650-CDA3-4E4C-BE42-BB84EB19F7E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F6D3DD37-BAF7-4DBD-85D6-A6FEAE19DFFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "6E04CD9F-35B4-4E99-821F-D219980AE2CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "285EA838-3D9B-46EE-A9DB-9349500FC3D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "70DE2F72-4AB0-4D0C-AD1F-4D924CB6784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "362FFD56-CFBF-4F66-974F-41FEE79D15AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1gd00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "C34A9FA4-119C-4B3A-BA67-B7305ED073A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D5CD5D61-1DF5-4B1B-8F9B-8786563BE8E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1gd00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "8B7DAEE3-5390-4981-A577-991A42696AC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5761-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2E784308-225C-4FD1-87AF-A2D052CD87A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5761-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "62F306FD-D399-4D3B-9F4A-6605B035DFE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5761-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "792D3327-54FF-4DF1-826C-670C2B91DAC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5761-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "4BE9B963-6B95-49DC-A499-3DE4DC269036", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "7EED502F-EBE4-4DED-822E-8CA310A354B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "3C8D09C4-AB99-498A-BDA9-20F040BA57B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EEF16762-3BCD-4908-BDFC-EE1DC34023D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0aa6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "3DAC6CD0-C5D8-4C87-BC35-93E49FDFB55B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "ADAF404C-8334-4754-90B6-5C1E6CCD1F76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "AAF3FA1B-6774-4AC1-B040-BE5815859FD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "92E3C47A-CCF6-4B3B-9B08-5D03186C817D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0ab6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EC1F4E15-3C06-4133-8435-1A76ACD6EF62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "403F0AD8-E663-479C-A45B-352B257F0247", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fy00-0ta0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "21439D8A-680E-489E-A1E2-4C31B49E82BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "DF180BB2-E8DD-4B9C-92C4-A8DD5EB83446", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fy00-0tb0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "A2C0E215-F905-4B16-9D80-81B440BA1F8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "9CD6B350-BA19-407D-9956-51D27A2E311C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0ta0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "EA5D4E3B-48CE-4C4A-A09E-FAEE74720091", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "57ECC858-88F1-4456-B7ED-D3B1847F354C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0tb0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "5415EDBC-1FAB-486B-B874-B7D35860013F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "7CB72EAF-7D3E-4C4F-A72D-9D1D085EC32A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "889744B0-52CE-49BB-99BA-4B2B668DC3C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "3A12493B-2032-4F3A-A994-B502BF0EC814", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "774C7E40-0B01-4C1E-8EED-4E8A91B73E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "4E36CEFB-337C-4AD2-AAAC-43EF62E0E014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "1E4695C5-F117-42A2-B3A2-50D4777EBA53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0C284514-F681-4B9E-9A1F-D3F7BE9B5C0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "851ECBFD-AC30-46BD-82F9-267A11199D06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2F31CE93-B417-41B0-8060-3116347424A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2fc00-0ac0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "DF581904-415F-4D9E-9A86-5342DE2FD4D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2hc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F0306E3A-302F-4F70-8358-C13824F023E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2hc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "75A4F315-14FB-4E93-B74D-9E52682A6B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2hc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0E5EAC53-E32C-41DB-A2ED-F7DDA8F1B49A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2hc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "BB7605ED-2ABB-4206-8ABC-3C1C1999DF17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F640E706-6912-4675-A3D8-B98374CB3324", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "8808A2F3-ECDE-46D3-AD0F-02BE2735A6BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2BB7F4C9-E24F-420B-9DCA-9E7994E05971", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "ADB85459-E2D7-4ED4-A0CB-17B68061E250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "EA798D9C-36A3-41C8-B9FC-8123EC9BF452", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1gd00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "64284790-C465-410F-B871-B0226725DDDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "C7290D90-688D-4BE7-8089-095959EEC46E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1gd00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D5246D7B-63BF-48BC-A98D-5A0646FDE6DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "BC05A12F-5ADB-4AC4-BBA1-A319330340E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "54B39530-AE99-4BBA-8C59-FAC84DDEF33A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "34480D85-D445-41FF-B0FD-5D722A487F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "634ADAA3-8F4A-44A5-BC88-1ED3F1EE61C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "9474FF4F-F936-4E72-8482-5D1C9C49C890", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2fc00-0ac0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "317D4551-6400-4E4E-8AB4-9024E4BE72E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "73CB46CC-6647-4AAF-B3C8-042C776B8532", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0C9A1C83-A000-456A-A443-ECCC4A5900DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "55B91BF8-1086-4721-8829-3D017341A25A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "ED8212AE-EC38-4F46-84FB-042AE480E53A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "B94BFF37-65A3-4F80-81F4-85647B4C2441", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0ta0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "9D9494C4-C03A-4B92-95B9-7D68FE604257", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "E4D701C5-F94E-4ECF-B0F2-477B7DF6630F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0tb0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "EFEFA2DE-F621-41FA-AB8A-9DF1F3762311", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0tc0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "466CEF9A-C71A-41DC-AD74-21FBA163E97F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0tc0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "B69D6A0A-EC16-41F1-A1E6-38FADD9A190D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el controlador ALFA de Windows 10 versi\u00f3n 6.1316.1209 para AWUS036H. La implementaci\u00f3n de Wi-Fi no verifica la Comprobaci\u00f3n de Integridad del Mensaje (autenticidad) de las tramas TKIP fragmentadas. Un adversario puede abusar de esto para inyectar y posiblemente descifrar paquetes en redes WPA o WPA2 que admitan el protocolo de confidencialidad de datos TKIP" } ], "id": "CVE-2020-26141", "lastModified": "2024-11-21T05:19:20.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.727", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-16 22:15
Modified
2024-11-21 07:40
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:video_phone_8875_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC2C53C-D4B2-4DB3-81BC-BEA0AF14355F", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:video_phone_8875:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC9019DD-6941-42F3-8B66-1F3CDDDA86E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "DABEA69A-F808-4BFF-BA4B-98B2E6113F9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "5A6417B6-D3FC-4FDC-9248-F30B3F4A457F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C6D7010-E062-4A1C-8794-9D736FA21FFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEAEFE4B-1C61-4B7C-A164-1FAE945202CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "325F2401-7874-4827-8ABC-00791DD76AD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "565CBBAA-2CA6-4FD7-816A-CF422C57E259", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "128A056A-C104-4360-8065-7240F5FB368E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "207F4636-A228-4330-A8C1-82612EC5E242", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "E963CC90-A9BF-4717-985B-869FE77441C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD018C-E3F7-4EDF-AF35-1FE07F54CBAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "116B9C23-D5DF-43A2-9011-CEB5835A7907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "50E1EE42-3AD2-4A34-A2AC-1DB924A1FA23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "91681B9B-2458-4A29-86F6-007FBE4E34A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F190764-5225-457A-A129-3AAA68F7B314", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "78B8A7DD-6286-4C51-A94D-B591CA5B8DE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EA3D40B-3398-40CF-9C37-722100DEC923", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E2F3E220-6797-45F5-9A8D-010F24BCBF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE7D4CFF-8CCE-45FF-9139-481DAF4A48CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "555FB9F8-C587-480B-B044-2037473C2FFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "EC4FAC48-4CB5-4EE4-978F-20E10AA854C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "CF301FF7-5447-4B49-82DC-F0408DE28F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6AA37B41-CB6D-49E0-8968-944916BE44EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DF1416F1-4E21-404E-A105-5B5C779633D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "7FA48285-A41A-4A19-9D9A-BCFF178A7B2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "38B73EE8-971C-47CF-817D-FDE2B3861499", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B35D198-8527-4414-989F-3A4EE601AFD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D62E3B9C-E3B3-4836-888D-97FE1F0EFCB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4788EED5-4067-4139-A700-142E4AABB2EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "4133BCB1-D7DD-4A6F-A8BA-E193E76CE98F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "82058653-1245-4BBB-B821-C0D56A02C54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C51B3E25-A2BE-458B-AEF6-23B5FE4A5785", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "E32AC898-7257-4EF8-95A4-25D439C02448", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "6E8BDCB9-4644-4B0C-89A7-13F20718B245", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "356954C9-0828-449D-B7C4-397F4CB4FBB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "06F05CAC-32C8-43D1-9514-A9D6BA9C4BCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "736BC586-41D0-4D71-93EE-953899AFA08F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7499E665-158B-47C4-B53E-98440EE2F444", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "40840FDD-E661-4663-8D60-3F8851A0748C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9083DE5F-C1B9-4D68-8A73-46D0F2B9A0A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "56729DAA-B823-480F-BB3E-10AF16A5871D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "5647C754-620C-4015-8A19-1EA66ECFCCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB6A92A5-8ADB-4382-AB45-0DEDE0561CB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "9577C5B7-AC80-417E-A366-F8DB68A69796", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "760B18B5-BEC9-4C69-BC20-28DAD37BD4E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9824121-49C7-46CC-B897-4DFAAE775CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0CB8C01E-1315-48F8-9842-74A563C32126", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "C263130C-904F-4769-8A11-F4873561B13C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6C0C169-F647-4BFE-B047-04D157FDD132", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAC3B1E6-EC7A-453C-B1BF-9E29C565B6FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "E2D404E3-EC6A-4CE0-8E6F-1000DE2656A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "F6664CAC-171E-4DD3-B373-D15DB450876D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "FFB8E2A8-9968-4E72-8E14-5F8EB8509E36", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C161FA77-40DA-4C96-A796-2B67A229A2BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "2CD91C45-D0AE-4B52-9E97-66517CEC5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "C1E8176E-1C34-4265-9A9C-2C3201A1F75F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "EE5A6FA8-8C64-4D64-A640-C3E964070D29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F8F3A48-073E-4A1D-B9DF-4B45FA993B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "B3ADDAE0-6E63-4F65-9C14-B4606BA33269", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F170D1B5-F5D4-412B-9194-1F96EB82AA54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "AF614C71-A854-456B-9C1F-29BFF6B14371", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1B88C00D-9577-4FF0-B55C-1891D738EC81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B9613F2A-3FE4-42C7-A110-DE23CBB9DFF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "FC2BE4E5-BCAF-46C9-8216-C7EB9BCD1345", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "8C30D57A-E458-4EB0-9C20-E336A586E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBADB540-9C35-4FD0-AF82-7980E1B2ADD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C077B45A-0B1E-4DA2-832A-1B201098C445", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "A36ADEF8-9844-4F0E-B2BE-D6A786B8A2A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A14EE59-AEB2-48B8-B08E-27FA1ED790D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "252AE700-69D2-4733-91F9-ADB3FEADC579", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "DE7EA9FF-CC6C-41FC-AFB0-4AB2B62759E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "0A38A681-F887-485B-8AD1-DB50C9F2D1B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB30CACF-FAE1-4A59-B0C3-8E0DC69EF0F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B781D8DA-0E90-440B-9286-C64E4E546224", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "E288B479-ECED-4F62-96E9-D321EBC55238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C71112F-F96C-4CC4-A8EC-385E67102B69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9673F09-8895-4360-8A2C-26EBCC4E007B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D6088BF-42A5-49A9-B0CA-EB359E302549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "E35416E6-38D7-4606-9C69-C22C0A15CC1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "47CDDBE6-D871-405A-91FF-8B1BCEAC0F3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "90C9277D-8BE4-4279-B41D-CE52920A5637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "41B7E367-F879-4C2A-B367-4ABB9CAEDC09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "A4665808-2B19-441B-906D-B45C5E2A01DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "AE8ECE13-617E-48B9-A1CE-F8E7A99FBFEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D822380-B514-4377-8481-33540C442950", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "97260119-5BB6-4098-AD24-D85B8DC150FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "5B8BFC6C-FC66-484B-9E6C-B524040090C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D0CB6DD-F460-4C12-81C9-4C2B2619A5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7AF1AF7B-6659-4634-B322-D41C2E612A3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "025A3CA4-32F8-492D-8201-B261E8B11953", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "40AD64D7-B604-4B85-9E5B-6FE2C5849502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC8254E1-EB56-4DA3-8F4E-8757B25B60EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A1445458-2520-49FF-B082-99D54A2B442B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E67326C3-A1F9-4F2B-BF3F-48CB7A3F68D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "243CC805-613C-470E-B582-B34D606C0067", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "CC7486DE-BC09-43D3-BA2F-0DD3BA5EDA6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A93DB06-29F8-410E-8C36-B05B386AB644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE22B9-1DB4-4838-A0B9-DBCBCE3D11D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "CF247772-C2E6-4966-9DEA-8F52C579C6D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E845D7A-AB83-4D92-A7B6-EF5A3AEFB379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A413900-C751-42A3-864C-3BB9D0F24497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "7806B918-B0D6-4F28-A16B-42508F9A358E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "FF443808-FE52-4F40-8EE8-2FEB817E101B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "09F181EA-C7E2-4CFF-84AC-B1208FC315C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "65B1C3D9-6EFC-496D-A032-56867FEC87D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E21D9-F786-48C6-BBFC-A38037BE6509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEF35587-AB88-47CF-AC6E-A4357A00C7C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0D0AE34-5311-4014-8418-989829131707", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "12F86BCF-0776-4427-88B8-9CCBDD7C8C7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3DBBB40A-1D31-469A-9453-60B0D26FFE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "A821497C-51CF-4FA5-B305-F73967B98DF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "004E0452-C797-4514-A85B-570BE00F7D21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "6ECB6488-E463-4B2F-A042-77B1EA5F38F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "30CEA593-1AFE-42BD-B9EF-BCB884B76E39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "E990D32C-8488-4EEE-A528-FF0AB7A481EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B209B18E-14D0-498D-A440-90308CBDC532", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9328205-20BA-4E86-AD7D-E387F4D24643", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "410DB7FD-26CE-4CFB-9B0E-D72723EB7B15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AE675AA-9D98-46E0-8F28-6DB19E15A319", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E75BFD2B-9596-45A3-9FFA-95EA467A68DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "22AD1216-C14C-4900-ACAF-082FA588A2C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C3A630A1-0490-448E-A224-83F5F711A10A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E373BBB-28DD-4C6D-AF44-D8E1F03123A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "649A1967-61D3-460D-B69A-C04FF45C3B1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8F368949-6CA0-4E08-88BE-4EE65FC426C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "E916637C-7951-4B97-8D09-8AD5819805D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "7472F127-BFF3-401A-957D-27A115768BBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFB5E611-1A60-4905-9D7C-0D0ACA16D00A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "207D658F-8EEE-4225-8B99-98A6D9097DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "120A1C31-0997-4E3B-9EB6-24545D54D282", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5B601-0F05-463E-A6AD-499CFE0D898C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF1790DF-DFE0-4542-A6B9-E6D7FDBF4B87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "4855D3B0-0A9F-4282-8F2C-BB8FFFB274F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "1BC3FCE3-A00B-431E-86CA-669BD878CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7731918E-CBE1-4A06-A5F4-E917AA6F4BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "D8654298-8F59-4C7E-8CE0-158362691746", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "E5E4EBF3-3DFC-44C6-A596-3F3CED7D6AA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECFB53DC-8F34-4380-A800-1CAB05459F4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C26AEE8D-64C9-4010-ABFB-6A624C4C85D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4FA7637-F229-4331-9E20-5261A715D5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "718B5D68-CAB7-46B3-92DB-F82EEAAD5AA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "023F69F8-B004-40CE-8CC5-B9DA48041D67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD479DBD-5567-4E2A-BA3E-88C54B36557E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "884DE708-ADEC-4C67-BABA-5589C498D6F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "FDE984CA-2356-4926-88EB-966A51A7E190", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "68A83E84-E46F-494A-B5DC-0AE5990F345B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5B79DE0-01EA-41DD-AE61-1954E21FB3D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "7183A8A5-E2F8-4B8B-9473-BDE00701504A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "6B2FC572-4BBE-49C2-8747-6B05D9D71611", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "54FD0FE5-7B58-4C72-8806-C7C12DD157E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "C627B8E5-7DD1-41FE-B100-B299EDEA9D04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "97787F93-231B-407D-B8B5-AD4D441A88B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "929BCBCC-FD70-4FCB-8464-DF4EA54C62DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "FC4542F5-CEF6-4315-8488-DC853F9F04EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5B8B602B-F136-4188-BFAA-40F4F7009CB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "98E3BC9C-29EC-47AD-ABAF-61182DD3679C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "319155EB-2E83-4E3B-9344-CFE8F87FFFF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "CABCEB46-40BE-41AE-9309-7EDBB1864021", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "69A356A6-8DF1-451C-B340-D616917CB6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BA43F41-FEC3-4554-AA51-952C7495F76E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "C0586121-D5FA-487A-AC4A-A9FA7CB3D5A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5D4490F-BC70-42A6-992E-561E79BB4F88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "03A8BE52-45F9-45BF-BFD6-5D60ACDA44D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0D721451-E61F-4506-8074-879482CEC6C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "2E4F2BD7-4FAC-41F8-9F0D-7AA960DAB8DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C247537A-0143-4C84-B286-E504C3D597DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EE85AB6-5359-44BF-8135-0C1C3E112FE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "DA349972-CFD3-4D73-991F-D40EC0114DB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A8ECD88-DC55-41FA-9168-D4D18C5C95EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "294AB20C-68FE-4760-9426-679D35564B13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FC08E877-0E50-4F6C-AD10-00D404D05ED7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "E09BA73B-2F17-412F-8F13-0823B3E0F4CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "580BEE07-3842-4B93-A593-9EDA5654E97F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "08CCBCF8-34A5-438C-9D47-5430CE7B9231", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "5DB5F276-E28E-458C-B574-04B80B836257", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "E76A0966-0B20-4874-AAD4-F9882C4740AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "60D5E553-E050-4EEF-A937-EF823FF5C1B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA1FD438-0B82-4AE2-82F0-F66C10387114", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5265784-E97D-4DC2-83A2-3030BA269ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "8FC0DAA5-EA0D-44BC-B092-7D7B0DEAE300", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "77F4BF12-3267-4FF0-90EC-97A749BC5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "58F947BD-5B1F-424F-82D4-4FA0ECFED656", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "206107B9-A75E-4025-AD08-1C67A79BBCDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A58A59BA-F531-41B9-BAFA-085EE678B6B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0F9FA370-9A6F-43FF-8F81-9FA1E20F570B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4DFB76AE-13DE-4A28-984D-48203A1CC943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B94AE3B1-D11D-4606-A90D-8794F1C08F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "DAC12C96-4052-47D4-B9C4-6F9E964D503C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "B41C0F3B-E3EA-44E3-8AC4-243518BF2E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CABDE7D0-114F-40BA-BE3D-2548321DCCE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "43E0AAD1-BE95-464A-A011-8DD8391B7635", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3CA4D75E-7788-4A82-81FC-B0DC74DDB387", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7D95B5F-2263-4990-BA8F-F8F42C10C436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D8E15DD-CE4D-4D24-A840-5D39BF3DCA48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F61EA433-3B1D-4EAC-898F-F2BC392E5C54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "A134FEAB-59CA-407C-99F3-3B7BC5AE007E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "12AFDD04-CBEA-42FC-AC76-E7578E9D1AE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "265975A3-D905-430A-B37E-FFBF04320605", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "F2CD131A-AF4F-4993-A296-86FB96C5CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCB81153-7067-4894-8733-FF4942D5BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8601FEC0-0178-4B5B-930A-72E377A69107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD56D3CA-5825-4AF7-AAD0-C9AB832E3943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9CE69435-8F8C-43A2-B293-140A9F40167C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3F9C58A5-C9B9-4A18-A9E1-651ECACD68E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "49E0C17E-91DF-4AC5-92D3-4C306BE8F47B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "77594E0C-E791-4F73-BC6D-00106F7E8B5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "1E047EE7-5717-49D0-A517-8FE3E4D7BB77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B8F67-E5CD-4046-8AE4-9DA435967FEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6261EC02-0290-4CE1-8E7B-14449725136A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCEB42E3-B3CE-4FAF-9BC3-F4230A6A8082", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "BCD446B0-0B80-4E01-880E-91CB9E1D82D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE5C8D7-3BE3-4BAF-969D-054C3ACD88C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5E5C60C9-3B91-4C08-B204-FB276466FCBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CDF0AA53-FB70-4D1E-8239-ED6BEEBD92C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F780C93B-296B-47DC-ADAD-3964F559C036", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0D6CEB43-EF96-44D2-8E42-155955BFEF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FCC9A9AB-D2E8-4743-A1F4-D6E351412933", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "5EA2EF10-1A1E-4FB2-A00E-3570E53EF559", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "4A2D7396-22AB-4E8D-817A-76AA1D8ED48C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "9AA4B443-32F2-483B-969D-9A90DEF37406", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "06A810B6-0650-48CC-89F3-6F732420D93A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "31CCCD48-AF6A-466D-87E1-266820123DA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F712E-A1EF-479E-BD1C-9F35C37F9526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BFC4715-CC63-4827-AEC7-2440A641C6CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D3412CB-A737-4FC5-9C54-8DF5586C719A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EF303D3-879D-430B-9D90-DAA79C3FC78A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "F164260A-63DE-4DAD-8DFD-3396ED3D7949", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A0A2B00-68AE-4A78-AA00-11E6A1F12A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "86B3695D-2613-4E92-BA29-3E341CF2DE7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "A91DFD5B-FEAB-4894-8799-A755CE06BCFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BC16B50-50C5-4868-BFD9-F0BB3D3C91CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8CA3369-438C-4FCE-8766-CE9540383934", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "048E8797-DAC8-41D8-985F-FE5A83A8A961", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3F8DC25D-67FE-40AE-BA38-A0FA3FA9A503", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "578F74E7-8234-42EF-8211-C3857227EDBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D603C7E-E740-45DB-999F-83D25F51A8FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "4A9F3F64-E30E-4BBC-862B-427D8D465624", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B24EA7FE-E7C0-47BE-B02D-7E8B840D14A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "53CDF5E7-E5F2-4EC6-B4D5-513905B87CBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4D6CBEF6-000D-409A-A4E9-6D650AA5257C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F74C833-16ED-4E26-BDAC-8B5DBCD0055A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5429B-BEC9-44D7-BF72-028B5272FB4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "45E16BCC-A22C-43FA-AA82-19BB8F0AE16C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E94B4F8-2D71-4C67-AE1F-42D9B441F55E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "297DD17F-C172-4681-A7D0-B73C73036C44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "71AB1DB1-B2D4-4ED2-B070-6C1DB03AB88C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "A9048DAF-D539-4187-975E-64C7461FEC75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1BDA1C93-1D77-4EA5-9ECB-DA6FEB6BA6E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "F46C1053-BE8B-4117-A084-7AC8940F359D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "D3DA7CE7-C894-41C6-BB20-FF6C4179EADE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "73490566-91DE-4B31-A159-D24D7ACF2973", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C19765-7AC9-49E9-9057-85895D22F827", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "15782A3F-1D76-440E-99C5-BB992E473A66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "451B569C-0670-44D4-8C6F-3361755B0EF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "DCE3C285-8584-45D9-83A6-525D6D8B3073", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF5F8B2B-1EB3-4C27-9485-3562B66A85F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "16CD80E9-D861-4E16-A194-875E4B9507A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "68DB276A-4B6E-47F8-9030-5D740F6E0766", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4363B65A-9D50-4353-B8B8-ECF2CC1618B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "4782D308-FF62-4ECD-B8B0-FD13CFA241A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "701C3763-F0FA-412D-9908-73B1DBE07794", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2912370-6F61-4BC6-B939-CF6616997C58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "678E05C2-7BB7-4EF4-B3D5-90BCEA2E32DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E15F943A-3492-4480-9AF3-1ED4E9BCC7C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "12DF1455-6F97-4DD0-92FA-31F13C7E5B27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0EAC1711-74B9-415C-A530-2400F22F0701", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "11A4A14C-2AD8-4B5B-8E86-C59246B360F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "950A77AB-4CB1-4255-8832-3F6D7D220AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B80DBBBB-7DCA-4032-899D-FCEB3DC4FBF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "9CC528E3-FC10-4364-85AC-A4168A6AA2BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABC10F2B-1965-4826-A82F-2A46C04511C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D824A2EE-D0FC-432B-AB48-F6A4756897DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "6AB3729C-3B70-4D29-A0BA-8EF856307688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C6F8384E-A69C-4B42-AF15-A3B69067A150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E11E46B2-9D47-4178-B0A4-C9B8B2AEFF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "418D5591-6D9B-49DF-80D5-4B9BD8D63619", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D8D53052-659C-439A-B857-AC773378F6B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "319D55B7-75AF-4F7C-9CBD-CE3CCC426E46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1B6D6353-733E-46A0-B68D-E023BE05F85F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D30380D4-3A23-4788-A970-43E4D2E6E8A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "F03DD6CC-F7E9-4F85-8B59-FF29AC39143F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "5323790B-7D01-43C2-9F2E-0EA461696E2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "711D5019-EB05-4DAF-BF72-36E17206685A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EA81344-8D42-4226-A572-B0A90F564618", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "8ED50204-80C3-4F38-9713-DEB8B0CBE112", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1564453-362A-475C-811E-65CA3907D568", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E242292E-6874-4CFD-A573-AC3EDFB45746", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "A44D6295-256B-4503-8707-83E6B681C24F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "07047B9E-2F94-4518-BBEC-86E6AC51ADC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "920B9D68-4CC1-4980-9A3C-07C6C90C2011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6DE550A4-9412-4ADC-BA6F-950AD4F72B4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "37664783-263B-4EA8-AD01-67B96BFFF553", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF17F64F-F378-4B4A-9C8E-AC44BE0B05F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1FFE9D23-4798-42BE-8D85-8ABE65C862DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CEE12502-8DB9-4C1A-8BF2-2AA2877A5BDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "2D6E6DB5-F415-402E-A296-C49FCF33883D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2809B892-17B1-4A0A-9E15-1725A8E6997D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C2EB1C5-2D36-4A6D-8F92-223F46CBD056", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "23C6474E-4F9D-48ED-A03F-DB087BAE0B64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "1C294B37-610D-4B5C-8ABB-F90129B7BE70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "EA3F04CF-F9CB-4830-ACEF-FFDA432C627F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C81514B-DA75-4906-A70A-543645975B24", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0B4EE2EF-AEBE-4B44-830C-C6C104782152", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "634D85D7-CA54-4121-8109-E8EDC35A41EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "E43CE640-9139-4910-845F-D61B03E3BCB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "90F0B54D-EA6C-4137-A344-7B85CA3E0A83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "0272102B-CC8F-4519-A199-8FCC4BEEE9E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "549F3BBF-2DB0-4C74-9A9F-6FB5382E5189", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "912231AA-C393-4975-8989-652F5F793685", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "82249A4D-4640-4D25-A69A-F5F2612665F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "56425029-060F-4220-8716-417B8D8F9845", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "5F449238-0BD2-422D-AFA6-9443E6C4A8C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "3CEE1353-D87B-4CD3-AFD4-82BC5423D91B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F889562-3DD3-443A-8590-50BF86AA4F76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "69DDB246-F153-45AD-BE18-AF7636774D05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "02F84C06-CE22-4F0C-B808-FB04BCCA54C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC501BB9-D464-4955-B70E-0B2A7A33C9BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "25558840-42E0-466C-B7CB-A7B9B20B15EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "10942B52-81ED-46F8-A2BD-2BD37A9117BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "ED4FA6BD-B1C0-453E-BDAE-735CD915A2A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8826F8C0-2056-4144-993E-96517F83B9CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "059EC856-BA67-437C-BE1A-0F161C402EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB4FB0F0-08E0-4017-9EDD-04D85A3C9544", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1409B505-E7EB-4FCB-825D-68FCA2A33579", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA7AEF19-A419-42A8-916B-62A09F3FB16E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "91D3F598-B3B3-4B6C-8EFD-2F8B71386A79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "DBCBE62D-1BDD-48EC-9BD5-ABE505C21668", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "80191538-8561-4A6B-8E61-12C7C0E56A79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C4B2C94-562D-4095-9C30-D0607AB73274", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "5A9D1167-C959-4BE9-BC3A-6F5B2B02D0B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "AB6ECC98-63F7-44D7-B1F1-A5BAF06C765B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "1DB291B1-D3AF-4847-B1C3-42C393B5144E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4620A953-1FBA-4493-99C8-D7EA33684677", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BCA71C3-A320-4AC3-A076-573B3E76217B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "45F69715-462F-46E6-A43D-78E55E85D49C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4A0E4A4-491A-41CA-9AA9-A250F9FD5928", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "60420060-F3E9-4267-8298-AD27F83753DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "3165D2DB-0D52-4CE0-B068-2FC29C2D910E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "545E3FBA-A50F-4464-9522-2A122F6024E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F2C175B-8477-455D-A3F4-F1BBA93ED1E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "2DE7287B-ABED-4F89-99C9-B379A8B3AFC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "63044AC4-E62D-441E-BCFE-16BD2BF958E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "925B4CDD-D482-442E-A092-0593F7E8BC86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "05335BA3-C452-42A5-8494-1A0815F94003", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8032D5B8-8A2F-42F0-BA5B-389297AD1BD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "927B3871-9E88-4C1A-A0E8-035AB5114FB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0350E26B-3410-46CB-9FA5-D97BE4453A06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "199F9108-3831-4E6D-8163-F9E91DED3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EAA02306-07BA-45C3-9390-7F2595C1A44B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6E98AF51-57CC-4613-BC16-039602548F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "6C57350A-E295-4140-B67F-B9CDA6BC5C03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9CFF0D9B-A151-45A8-8410-F242FCA0F776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "95146F05-4807-414F-A650-09751DF44770", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "284DFB55-8FAD-4586-B91C-68C94B2689A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F1EC232-6DF6-467A-8264-249899B93692", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D39942C-A7A6-45FA-AAD9-5373DBBC2713", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B22FA4A8-D59F-4E5E-A7F1-73AA9D15326F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "992CAE24-643E-4CD1-A2CA-44664C1DCDCF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7CE092C1-6DE4-4C0A-9120-3E67A48878B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D3CA5CA-069B-4A09-9118-9ABE3D06AF5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "D715A726-527F-4ABC-BBA3-116E6B0DC65F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8AFF-4ADD-4105-B719-604A2050C4D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "DA097C40-F063-409A-B355-4721EAD12DA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C62E6970-DEF3-4A8E-BDB1-3A297C42736D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A05054E-1743-46B0-BA2A-50E0DF42544A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "783F63E0-3BB0-4770-AB01-A4A1127A4FBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B11A2C76-28EB-405F-9C03-B71C92C3ED23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "667C9C62-4E06-4420-A04C-0566D18FD0F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "528FDCE1-E110-46BA-82C5-BF9F92CBF3B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "93CCEA69-D71F-4620-A59D-96DE286EDA78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "05BCA2FB-FE1F-427A-983D-EAE585BF7C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9F5E95D0-E4EA-4E8D-ADF7-B8E3654E3AD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D7986EA2-5C2D-44F7-99F7-2F3EE0F1557D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D931AB-034B-4061-9156-039010ECB648", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "44840ADC-C771-411D-BC4B-4D885F483C73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "75A0A159-1F94-4767-9BFC-43CDF9FB5213", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C41A449C-F8B7-461C-B7DA-9A240C157A07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEF4B3AF-D0E8-42D8-8586-742C870D371C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "71DAB4BC-C020-4C03-891A-D7450B786598", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "31D3046B-8C6C-44FB-A231-AEEA9168B54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "603B3EB7-5E27-4E65-87A1-91E94AE088B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "4743476E-B76F-4AC5-A5AF-4E49B2D3C2E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3460D6-D43E-436F-B01A-FFDFABB46830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9ECBE27D-A7FB-4F3B-A19E-3DA2D99BEF34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7CFD51-3F85-44AE-888C-4F8372E45D9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "F18B906D-F88D-42F7-8BA1-145EDB2401AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B2F3CAC-10F6-4D64-90C9-E46DD672F2AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "350D9A32-911E-49E6-915E-9210A5560150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F58F39B0-E8E3-4AE0-960F-C6C28D92C505", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3783B1-AFAD-46C8-939E-53AD6234AFAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9325345E-8FB3-4360-83BB-FEFA2904DD3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FA9B687-BE83-4597-AC7E-A2E0FE705415", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "5AE24180-48E8-4B95-B6E8-EF3C900D87D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B0CB76DA-9077-4D6B-B555-60F695511743", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "3B9BAB23-FAF3-47F9-952D-207211A7C115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "70F8D873-703A-43C9-9EFE-CA57A795046B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C772D6D9-F6B4-4A32-B49E-F2C10404A384", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "05645278-6903-4C42-B1F4-116615976113", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "01E1B2D4-06E2-4584-BF76-7F6FAA21F06D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "0218B816-6FA1-4BE0-BC6E-277C17A5DB67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E5726EB4-B1B6-4DF9-9263-D8B5742CEBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E345118F-4326-4A07-BF68-E59407589AF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "E4087699-0424-4C5B-83F9-399E2781381A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "60C056BA-9EF4-4D89-A7EE-96A8A0592266", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B25E6A71-08F9-477C-B313-235CE19935D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "F1B4FFE4-C7E2-4224-81AA-CE310D6F5B30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "2CF5AFA3-DA14-41A9-8969-EC08578A7B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0477E171-F551-4C6D-ACDD-9F73F236A26C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "051C4B11-1134-4593-9C06-A4F7F2086D31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0066BE4B-A511-4BC6-8208-B9C102C1D3DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9B3DE1C-20A0-4FC2-8E9B-19FEB6170BF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "664E161A-1639-46D0-B624-E82B94F6F3AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "649BEEA8-7C75-4D54-B9F7-B7109C491CED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "2293C16C-4253-47DC-8B34-BCB6D5345D69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D6BDAEE-9392-4572-A3B6-289B7C7E8DD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F6187843-9D97-49FA-A324-98A826427160", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "D0A87A43-8FD6-41A4-8401-4436CCA82509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "97330FB4-0A61-44EB-A4E2-44CE8A0BE152", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "572569A3-2B98-4C99-B881-536E5BCAA92E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D41E9AE-DE06-4C37-BB2B-63D324E1E19B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "105A04F5-8225-497B-BA54-9C833348B2C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "16FCCD31-EC94-48B7-B891-6C9B6A4D3E59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEA972AB-B368-4D07-AFDD-0BEC951FD759", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "11D76A00-20A1-4EF6-8250-A65EE320102D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "6A81EE63-1E69-4361-8196-8360B7CC4AB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "919074CD-DEB5-45BC-9069-FC38934FD3A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9D6A89A-AC97-4261-8A9D-AA629927078A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B6D6D-5AD3-4D42-99D0-77CFA898B01A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C8D6DF2-DBE3-4D46-A047-54AFDAB0F6F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E5E4DDA-E4C8-4161-A3D9-CB1473FAA918", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "AD8D45B2-5FB0-42FB-9724-B8F036D3EA56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A4ADDCF0-6D19-45B0-9C5F-DE8D6D210F02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "73DA8441-972F-48D9-8155-0532438B7504", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "8AF826B4-1829-423D-AB48-9A19B0F2F304", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "325EB932-6054-4B55-BA14-8A704E26BA6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "271A5A6C-B5CC-447D-AF06-64592BA186F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8800_key_expansion_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CDF3D2A-D68A-4B0B-B16F-9B137FE2E1C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "AC9BAFC5-C637-4E1F-A2FC-73EDD24708F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "1AC2AF6D-8C20-43C9-ABC1-A1B33B2DDD6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F038B43-4F5D-4A5F-9C4E-7F0DFABB7AA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10D0168D-2E5D-4EC3-9026-E2B00DC2057C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B68874B5-4985-4A55-A49E-E73C53B3CB73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "340E76AE-9AF2-4AE4-945C-BBD6FEA0C4C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "723573C1-35C3-43CC-8FE6-01B8686192D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "619BD39F-10FC-43D1-A862-456586C3A430", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "F045224E-23BC-46BF-91BB-E12B286E3334", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "674AACDC-48EE-4A29-8871-952D508F9F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B929BC34-3B5B-445F-9C95-B84E65490CF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "9566B3B3-3B42-4750-9B2A-4F84D918982E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFD4BC35-E46F-4E87-8710-5807D8923394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "489726C9-307A-49E0-9B9F-A26A9D3BA5E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A98DA9-E72D-4F15-B008-C1A40518D83B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B8FFDF6D-DB3E-44FF-8C9B-0D8548AE8804", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "80E92704-41D9-4802-BEF2-607DD2635854", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F02588C-C56D-4951-9949-CE62A151A5F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "BB74D839-CFB2-4D28-8445-0151C6B14D03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B019D8C7-6B34-4A15-86BE-260B80EC89A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "69C612BF-029B-4873-AE41-C107309D189D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DB08A151-98D4-42F8-B14B-E0C2847EBD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0760E92B-16B7-4177-BD1F-5A22EA1CFDDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "715B53F0-099D-45C0-ABF3-91028C2AEA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "436BC808-6B54-4387-9575-42F80E2A925A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4BC1BAB7-9825-4A91-9441-EC13D55DB648", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "DB25358B-589D-43DD-A20A-9C4193140A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "31FB0596-C9E0-42D5-AB6D-B8B82A1EEE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "88058E00-C3D9-464E-A226-3B97BBCF9E62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8E87B6F7-0753-40F9-8E2B-858D626B3E06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "511B3B6E-528A-4D84-B0DA-13EEF484CC4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "3C296AAB-FC65-46D8-94D4-BB728C419FE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "B778707D-02EE-4FC1-8406-CA79039A602D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DCB1EF2-67A1-4159-8FC5-8A155061CEE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E67F17E2-B5CD-40D5-BDB6-122AC9B3E4E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3EC84E9F-53F0-43EE-BB11-66FF0C01A392", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECBEC8C6-8617-4745-8847-E676E634A37E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E7735FC0-FE8A-49FE-AD35-4A15514B2E1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "35ECAFB3-E81D-4B72-8A9F-926D4E30B2FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "0384CB13-ACA2-4219-B61A-CE472AEC42A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "762D42CE-E175-4099-99D9-C27DF4DDC96D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B78565A2-2F03-43EC-A290-BDE534DC7142", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EC50185-33A4-45A0-8FCA-DEB9EDEADED3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F397C5C0-8DA9-41C9-8531-821F098AD203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3E5F2E80-52C5-431E-803E-9D91D4A48549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F890F47E-575C-47C1-9658-95A0CF6C35DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "5981CF41-2548-4323-AEE0-B1E827F346DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D7A67BB3-DFFC-4117-B01E-96F04D90F44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "551BCF57-8461-4EB9-864A-94D306CC748C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "0C804C84-5E61-4445-B7B5-435BD367836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "1A6C776A-B236-48C2-8F55-C8CC0E0B3621", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "A4B584F0-5381-407A-B087-1143BED263AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF6CEF1D-8ACB-460D-89C2-B259CBBB4A50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B9AA167-B21A-47EA-BA0A-C690548A0D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "7B261AAC-212F-4924-AEAB-088254B2A943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "841F097C-A61C-4954-9081-5F81F8AC71AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "657CF7A8-A81D-4F07-BD15-4AA056ED564C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC3D3F94-718B-40A5-8029-1F9401B1DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "AFE2F35E-AF83-47E3-8135-49DA4D059C4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB2FB07B-9EB3-45C0-B647-FF2FDEE7E0E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E9FF6B0F-7CD2-4720-831B-9CAB2F0E3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "6E1163A0-F4AF-4A5A-9F3D-AB7148210B9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "5E62050E-83EF-4FB9-94B4-4F2F015BF876", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "8D1A84BC-B4F9-4C55-9DFE-C6F8D780BC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FFEB151-C625-4460-BB36-D0F96AC3ED39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "48C2F7ED-64A3-4451-BCA4-129B103C4563", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "045AD916-F7BD-47AF-A4F7-65220DD7A6A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0237D11B-5932-4278-85A1-804DC35C1607", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D214888-2441-41C1-B4CD-E27B7EDEC1BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3ED5C195-CBF4-4FB5-9D5D-7C7089386A58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "18BE37E3-529A-4116-BEF5-3CB64A516FC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F33CEEE-9108-40CC-85B8-B0F5EEB66E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "D60C4195-A37B-4F60-9E90-6DD683DC77EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "7EAE6495-1E91-45F3-9C77-01C8988E1D53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E037CCA1-F4A3-4ADD-B1FC-C15DE2B1FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1F9CA9A-1129-4EED-BC24-05C63CF120ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FF1568C6-188E-4E0F-B226-75ACB9AABA91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD63F11-5C36-46F8-9526-C842D114AB48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3CE7645F-F4A5-444D-BF6F-A3005170E6E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4FBE26B-1254-464E-A94F-1DDE40DED972", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "7CFC1CEF-54B3-44F5-9A22-6A8C414B19BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "33BB0E64-BA3F-4693-96DF-967EBB4F5D45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "F2779379-8297-4580-A38E-9EFF46E662CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E98D9E04-3F48-4ED0-9740-BB43DF730432", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AFE05035-B3A3-45DA-AA8D-B39AA1051A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "F0A8B53C-8C75-42AF-ACEF-C57B93B34A8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "FEA0573C-190D-4B22-9BBB-A715E02D3A67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "34A30151-4114-4D93-BDE5-5A6DFDFD66E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "F1412B71-4295-4C69-82C8-A8FAC4812C4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DE61C8BC-10AA-4FD3-BCD4-89B519D06CA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "D03762E2-C3D1-46AD-A319-4E9D12BF3CDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "B13317BC-3BF3-471A-AE5A-B97622B6EB84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C9D79ED3-6D47-407A-B22A-6752C9F06168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "2D7D7C6F-9E65-4C9C-9CAF-2677D3DAB422", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "C4FBC2AD-0CC6-4C56-BE96-0A5FBCD9A3EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "75B5C3F4-D573-4FDE-A626-EE7D4449B0D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0947C0AD-DBB1-44A9-A4E9-714C030FE48A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "D7F831E4-7DD8-4840-A797-EC25BA20FC95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B41968BF-F0CF-4D0F-9E28-FF7012507248", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "073457DF-0B68-4EB4-B494-D00AD4941E7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB5C5C7F-E37C-4F74-9C4F-4B510D7675D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "BF442016-A3A0-4170-B90D-D51065ECF4A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EAAE48DF-0CA1-4AED-ADA4-C68193BFD30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "ADD2086B-C210-4764-B30A-53DE87A7581D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "4585B8D2-209B-4037-BC17-435429A33981", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F1E9CAC5-F2AF-44F5-8D16-D9ECBAA42023", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA06D8E8-B9D6-4D0E-9835-B9FF748D99BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DD5E5A9-35F6-49C4-8AF1-76034E7A14C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "29923F8D-10A0-419C-9971-5A6911A785E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "60681C28-C0CC-4530-B8F0-C480D990CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9588942C-49B2-4CDE-86BE-351043B8952A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "7868ECBC-3A91-4C9B-B434-A906A3E4933D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "2F1FFCEE-5733-4FA8-82FA-100CA9356C74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "39838207-BFCF-4D50-8F0D-CB1F803713DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "035D8DAD-28C8-4F17-A111-6F3A9ED0F794", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C479BF8-CB2A-4FED-B73E-37E196D7020A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "100B2F4E-52AB-4C95-A498-F264DB882FB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "2CA22313-0B4B-4A9D-BDEF-F9E973C26552", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E3AFA22-0827-422B-A000-8AECDC25C4DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "052EC44A-48DA-42BF-8122-4F538273A8A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "20E83CE0-FD4A-4020-A6C2-676EFD5A3AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "52A82461-6C35-4059-87D3-08CA394F0F73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4699E9BA-AF1B-4821-820C-9DA874BEF387", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "16828690-DAAE-4EB8-A9D3-2A49FAAEFA5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "B4C42B43-CA61-48DD-8478-43592FFA06B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "31AD798B-D1F0-4767-960D-AE1366B09A3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AECEE3E-AC32-4260-BE9C-289B77870502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D7A9E3D5-B353-4D95-9A72-41E160759C15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3A859DE9-C63D-436A-8C4E-BE1EEE142B57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A215146-4551-4451-A386-07855B0D72B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E59E08-4822-482A-96F1-02F677B914FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "2B7562C0-549F-4886-816C-888E2FA30C74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "0C8A2029-8EE7-4B79-9B03-5B05CE3FCFB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C425B776-A41E-4B0C-AA63-30B64880205D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "CE63C747-7D82-4888-853A-13F5BC6EFFFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "31B41E13-1595-4259-9FB9-294796B82909", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "28080BE5-408C-4A1F-A7C2-3088AF52DA79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5FCC13A2-DC3A-4EE2-9009-A2B034CC5205", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8ACB3B4-9DD1-4FB3-B861-46C5D4338EB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "641D178B-8C9A-4373-8789-FE161DF8739A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFB1AD40-1B4C-407F-A1B6-99EDF5CD5856", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CAE8C11-F27B-495F-A6A7-775BD020A238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "59977D01-EE5D-4581-849D-C9C14049FFD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "E49A4D27-FA03-4C4C-B382-617F6FF3E9A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "46E1AF65-4336-4286-AC98-8B9A7ACAF1D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD49880C-A06E-43DD-9FBE-34F6E53AA05A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8D09028-B17E-4702-996D-D20F9A159873", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "46E7C7B9-E3A9-4C8C-B25C-D27017CA0921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "325F91DB-B2EC-4646-A8E8-564B1190E043", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7970E2B7-9D5B-423C-8AD8-8051C1D0873E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E6C316E6-995D-4EE9-9E89-C6A99D0999FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "292E3DA4-87C6-4FAC-996B-B01BCCC2C149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "794FC736-3712-438C-B208-32C52023CF76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C644985A-337F-4A2C-8895-CF0CC868A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EBA00562-A4EC-4B41-84D4-827AAE38B8C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851_key_expansion_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AB0894B-04B2-4E6D-940F-2CCDABE962C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "68C3B91E-6440-4F33-8CF4-0A903EC08566", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "6B1CAC22-A0CE-4B13-82B6-E12C0A318D1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "080645B2-DBA1-4F6F-B72E-A5383EBE9842", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDB3DBE4-FB2D-4AF2-9964-5BA11ACAE094", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3363A0F6-D438-42E4-BB59-DE04D5A23C8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B96B5E6-787C-4AC1-8490-D6B6591A0BEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8B0C04C-AE09-4EDB-9D19-7F316261E07E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5AA9F-7156-4EF5-AFA3-84F9AEE740E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "37D3428D-F68D-4346-9FE5-3042956067A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EF666268-4180-484A-86D2-44DF7F4F8273", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3DC98996-05DC-479E-ABA8-5F076CF62678", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "C96268A7-3251-4455-A95B-07DF5D6D38DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A9953-BE93-4D3C-9EEC-0547D7F8A390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "72E33F84-55FE-4462-949A-888F0A28A06E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "51E0CC4F-7291-4F85-A2FF-E0CCC24CF3EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F7C77029-0751-4D8D-B32E-57AE37D018DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D40D4BB-A6BC-428B-BB9E-BBD9D1560F9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1AB93FA3-06C6-4284-BFAF-F0095D67BACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4D891-6A4C-4B07-86B2-0995038477D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "C128AB7D-D91C-4C9C-9992-A43C131F41D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "2AC595D4-B946-48BC-98C5-38715A5E4719", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3394B29C-1845-41D3-A9AB-46599A2D087D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DA5D7B9-86AE-42F9-904C-91C7EDFA2792", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "53D54ACA-AB7A-476B-B8BC-3B8B20D80DA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "390D943A-C4C7-4412-9714-3EEF97A1EB7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A9E67-A782-412D-9479-043F4997D7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "1B8E10B2-C291-4D38-863A-5E6F16C19128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DDC7EEFE-4A03-4510-845E-3ED2369B0C7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7AED7945-34E0-406D-8DB1-90E0EEFC32FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "BC8F6449-440E-46DE-9D16-70AE472E5A5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3E555AFA-9E35-410F-ABEC-651A21F0B044", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861_key_expansion_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF034C01-310E-4B64-B8DC-B6054B0D26DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "24B726C0-D2D9-45FF-8EA9-1F1293BF9302", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "EA860D6B-D4B1-43E5-8ADC-F39001E49DDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C8D8C98-B8CE-421D-96EA-A6F98D3B22AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "33AF04F5-439D-4021-8DE6-0BC1ECCB9D29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "70EB545F-5773-4782-A16D-0EB78E63BDAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F7BB8-128C-4DB5-98FD-D2C38FFECF4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D7AB8752-7651-4882-8AFD-464DE6BCA85C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "C6325756-0929-48EB-867B-365E9E261A87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "3F371DF3-3786-40A6-A270-3B8CACE55D8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4939E8F9-D100-44BA-93E4-3D2110B0C45B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0940A9D7-1ACA-4B7E-9934-2E034464A971", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "3DA1B884-2093-4A45-BC6A-60D35136FDAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "615928B2-F08D-43DA-8F98-0EB9717E86FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "41D85B75-3956-4DB6-84AB-3EC94D9B8319", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "ED1C83C6-9AD9-4DBA-B9D3-8A6866AB147F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "DD8CDF57-621D-4CE0-AE81-CA69648A448E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "ACD0F966-FF5B-4922-ABE9-70E04B293D51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "19B36C31-FF01-41AE-A287-58743F0EC1B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "34B22E1A-D8CA-4050-8E88-060BB6DEA096", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "EE476131-EA5F-451F-B499-CBDBDDBA9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "ABB71861-BF39-4253-9376-8AA8DA531471", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "22B483D7-F410-4AAD-BA82-1556BDE3709A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5038C3F1-AF13-447A-B609-85258A01FFBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "8A1D0189-6E94-4DB7-8372-39A132136A17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B5D413B0-A268-4FEC-998A-A0A36F632CBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9F9317E-DFB8-4C8C-A885-23C655F088A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "46F5F10C-F765-463F-896D-A8453F92FD83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C47A3B86-E1AA-453C-9651-188070EDFCD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0E852D82-72A8-4785-B048-A14ACEE99ED7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C5B9999-9921-4FB2-8DCE-6835CAFFC1CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "FB4F9FB3-6A31-4DF2-B582-B4C115767CDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "01ED00F8-0BED-4EEB-846F-51422E085F81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "D029FECC-148F-4E90-9F7D-DB7A589AD5A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9D7D6BD-9E28-49D4-836D-1A5CAC1F78E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BA1F35-7AF6-46B1-98A1-AE2AD5237707", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "641AF1DA-4942-403D-B4A2-9AF87C176466", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C6D6A64B-C659-47BE-8B66-5BCADB33D45D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF5125D-0A04-4EB7-A7AA-1F566D286F17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "842EB3DC-A278-442F-A3A9-45F815AE1D98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "AF2D1336-2EF7-4280-A594-EF4647C8DD1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8DAB9B94-5D57-46F8-A522-7CABB0147883", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "443D04F5-370D-4812-91CD-ECDEA64AA526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "1FD6B837-5BA1-49E0-BE6B-DC344E05CE52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "57D33673-18B6-4D99-970A-BC72DB1E5909", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "065D7046-E8EE-43F6-9942-18BC65A088E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "86B059BF-F869-4C3D-848A-1CE9B96A3A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "078CD00D-7CFB-4F2A-96B2-DB111971A0CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF27471D-9C51-40AA-A037-30808A94A400", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "32E65419-104F-467D-88CA-8800BAC94187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "F68E0B54-0508-4816-88C8-07F54526CCE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "0871D409-AF8C-40D1-8AEA-A7892791895D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "B1FA15F7-AE16-4902-BE48-BD1C84DBD82F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "87CCB121-43BD-4A08-8C63-D7F662F6F983", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "19A339A7-4144-4C62-AEF5-7431FA61172B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "D4BEC729-829D-4417-98FB-9260D77F3236", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE164423-2BBB-46E8-A491-A265302178A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F932654-D828-478F-8CD2-7789A478C906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7F4AC678-AB74-4EAF-830E-79ABD38E5930", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F7DB1393-A655-4B92-BE70-9824E92E66A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7F97F322-FE43-45C6-A2BC-33BC0ACFDD52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "CA89E75D-674E-449B-AEE5-54CE5B6B4DCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7B61A939-4E74-496A-8D33-AE42B4602203", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition." } ], "id": "CVE-2023-20221", "lastModified": "2024-11-21T07:40:55.780", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-16T22:15:11.687", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-05 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C412D40-7E0A-4FF1-9D07-21117B915509", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A2F31BA-AF80-4C21-9FD0-A0DB1D304024", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158B805-6515-4DC3-AB76-1D2F7036492F", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8096985-5813-4098-BF38-FD09CB2ACBFA", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "327BB99F-F398-49C3-83A2-DE8392F13A51", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1021FD6B-50A7-40E1-8081-F7BD80777E75", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CEB6D52-F968-4D81-A0E0-F9E81CCBF1AF", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E38A06CF-5C29-47EA-8E63-45DED1085864", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F94AED70-743C-4764-A342-5503649852CF", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80C0B9B7-C7F6-4FF8-9CDD-F823516C0F31", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A4A4B0F-3A7C-4EE9-A6ED-4C1E1C4AAD57", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE05ACF-E50D-478A-B24D-5DFDADAC14C1", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DB7E94-661F-4447-9338-1BCB46CCE665", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F3968E7-EFA1-42FF-B62B-8D76B1F9AE70", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF864D9-B587-4FCE-BEB2-9A1EC49DF8F7", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CEB9EC-D645-4EFE-AAC3-8EAB120B654F", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "801FD445-7410-457C-98CC-F839427CEBD4", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21B5DDF7-4B8D-4E26-B816-1981F29B35AA", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BE38659-4111-4D7D-8B6C-54B7D28EE5A9", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C25A9EF-0963-4BEA-9183-B21CA2871C03", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F64960C-05A6-4150-9307-8890F617B077", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1498AAB-2129-48F0-9985-60667F4484E4", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D85F9FDA-AA2E-4E40-A4C0-086ABA8CC238", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDC48168-00E4-44F4-82A0-AB3A3F12E934", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6487419F-6DC3-4606-87B3-B429314E00D4", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13C4E4FC-0B10-4447-8EF6-9D82C833DA20", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31CC8824-E700-4D80-9F96-5076D4DA7816", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A8762CE-FDC4-4C8B-BA64-8867711CDB46", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECD950B5-786D-4C9C-BB33-3F9DF41891F6", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9495099-FC90-46E7-8B86-1BC8B9B055B5", "versionEndExcluding": "10.3\\(1\\)sr6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "660475FD-8475-4968-9ED2-D83461B9A5D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_for_third-party_call_control_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5699693-DBEC-429F-B67E-0B1625818FAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831_for_third-party_call_control:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7AA843-E37E-42A0-BD4C-9710BDD50D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B20E2DFB-CBEB-4A0A-B099-3D5C7A973EC9", "versionEndExcluding": "11.0\\(5\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A40EB66A-AEA5-449A-B025-996882A25DC9", "versionEndExcluding": "11.0\\(5\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)." }, { "lang": "es", "value": "Una vulnerabilidad en la implementaci\u00f3n de Cisco Discovery Protocol para Cisco IP Phone, podr\u00eda permitir a un atacante adyacente no autenticado ejecutar c\u00f3digo remotamente con privilegios root o causar una recarga de un tel\u00e9fono IP afectado. La vulnerabilidad es debido a una falta de comprobaciones cuando se procesan los mensajes de Cisco Discovery Protocol. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete de Cisco Discovery Protocol dise\u00f1ado hacia el tel\u00e9fono IP apuntado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo remotamente con privilegios root o provocar una recarga de un tel\u00e9fono IP afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Cisco Discovery Protocol es un protocolo de Capa 2. Para explotar esta vulnerabilidad, un atacante debe encontrarse en el mismo dominio de difusi\u00f3n que el dispositivo afectado (Capa 2 adyacente)." } ], "id": "CVE-2020-3111", "lastModified": "2024-11-21T05:30:20.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-05T18:15:10.783", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }