All the vulnerabilites related to cisco - ip_phone_8861
cve-2022-20774
Vulnerability from cvelistv5
Published
2022-04-06 18:12
Modified
2024-11-06 16:28
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 7800 Series with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:49.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220406 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20774", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:59:08.204328Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:28:57.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T18:12:22", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220406 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ], "source": { "advisory": "cisco-sa-voip-phone-csrf-K56vXvVx", "defect": [ [ "CSCvz56447" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-06T23:00:00", "ID": "CVE-2022-20774", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.8", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345" } ] } ] }, "references": { "reference_data": [ { "name": "20220406 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ] }, "source": { "advisory": "cisco-sa-voip-phone-csrf-K56vXvVx", "defect": [ [ "CSCvz56447" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20774", "datePublished": "2022-04-06T18:12:26.733091Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:28:57.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20078
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-10-28 16:33
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20078", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:27:17.404874Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:33:46.026Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-03T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "source": { "advisory": "cisco-sa-ip-phone-cmd-inj-KMFynVcP", "defect": [ [ "CSCwc78400", "CSCwd39132", "CSCwd40474", "CSCwd40489", "CSCwd40494" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20078", "datePublished": "2023-03-03T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:33:46.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3574
Vulnerability from cvelistv5
Published
2020-11-06 18:16
Modified
2024-11-13 17:43
Severity ?
EPSS score ?
Summary
A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:37:55.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201104 Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3574", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:12:06.604039Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:43:05.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-371", "description": "CWE-371", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-06T18:16:31", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201104 Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv" } ], "source": { "advisory": "cisco-sa-voip-phone-flood-dos-YnU9EXOv", "defect": [ [ "CSCvs66815", "CSCvt83239", "CSCvu36012", "CSCvu36026" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-11-04T16:00:00", "ID": "CVE-2020-3574", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phones with Multiplatform Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-371" } ] } ] }, "references": { "reference_data": [ { "name": "20201104 Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv" } ] }, "source": { "advisory": "cisco-sa-voip-phone-flood-dos-YnU9EXOv", "defect": [ [ "CSCvs66815", "CSCvt83239", "CSCvu36012", "CSCvu36026" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3574", "datePublished": "2020-11-06T18:16:31.678368Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:43:05.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26139
Vulnerability from cvelistv5
Published
2021-05-11 19:37
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:09:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26139", "datePublished": "2021-05-11T19:37:55", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3111
Vulnerability from cvelistv5
Published
2020-02-05 17:40
Modified
2024-11-15 17:42
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP phone |
Version: unspecified < 12.7(1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:24:00.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3111", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:25:09.510937Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:42:42.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP phone", "vendor": "Cisco", "versions": [ { "lessThan": "12.7(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about this vulnerability. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:06:07", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ], "source": { "advisory": "cisco-sa-20200205-voip-phones-rce-dos", "defect": [ [ "CSCvr96057", "CSCvr96058", "CSCvr96059", "CSCvr96060", "CSCvr96063", "CSCvr96064", "CSCvr96065", "CSCvr96066", "CSCvr96067", "CSCvr96069", "CSCvr96070", "CSCvr96071", "CSCvr96738", "CSCvr96739" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-02-05T16:00:00-0800", "ID": "CVE-2020-3111", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP phone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "12.7(1)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about this vulnerability. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] }, "source": { "advisory": "cisco-sa-20200205-voip-phones-rce-dos", "defect": [ [ "CSCvr96057", "CSCvr96058", "CSCvr96059", "CSCvr96060", "CSCvr96063", "CSCvr96064", "CSCvr96065", "CSCvr96066", "CSCvr96067", "CSCvr96069", "CSCvr96070", "CSCvr96071", "CSCvr96738", "CSCvr96739" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3111", "datePublished": "2020-02-05T17:40:15.678994Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:42:42.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20660
Vulnerability from cvelistv5
Published
2022-01-14 05:01
Modified
2024-11-06 16:33
Severity ?
EPSS score ?
Summary
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA | vendor-advisory, x_refsource_CISCO | |
http://seclists.org/fulldisclosure/2022/Jan/34 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Session Initiation Protocol (SIP) Software |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:17:53.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220113 Cisco IP Phones Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA" }, { "name": "20220114 SEC Consult SA-20220113-0 :: Cleartext Storage of Phone Password in Cisco IP Phones", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Jan/34" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20660", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:59:21.438909Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:33:25.971Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Session Initiation Protocol (SIP) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-17T19:06:13", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220113 Cisco IP Phones Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA" }, { "name": "20220114 SEC Consult SA-20220113-0 :: Cleartext Storage of Phone Password in Cisco IP Phones", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/Jan/34" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html" } ], "source": { "advisory": "cisco-sa-ip-phone-info-disc-fRdJfOxA", "defect": [ [ "CSCvy39035", "CSCvy39054", "CSCvy39055", "CSCvy39057", "CSCvy39058", "CSCvy39059" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phones Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-01-13T00:00:00", "ID": "CVE-2022-20660", "STATE": "PUBLIC", "TITLE": "Cisco IP Phones Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Session Initiation Protocol (SIP) Software", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.6", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-312" } ] } ] }, "references": { "reference_data": [ { "name": "20220113 Cisco IP Phones Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA" }, { "name": "20220114 SEC Consult SA-20220113-0 :: Cleartext Storage of Phone Password in Cisco IP Phones", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Jan/34" }, { "name": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html" } ] }, "source": { "advisory": "cisco-sa-ip-phone-info-disc-fRdJfOxA", "defect": [ [ "CSCvy39035", "CSCvy39054", "CSCvy39055", "CSCvy39057", "CSCvy39058", "CSCvy39059" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20660", "datePublished": "2022-01-14T05:01:29.253864Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:33:25.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20018
Vulnerability from cvelistv5
Published
2023-01-19 01:35
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Session Initiation Protocol (SIP) Software |
Version: 9.3(4) 3rd Party Version: 9.3(4)SR3 3rd Party Version: 9.3(4)SR1 3rd Party Version: 9.3(4)SR2 3rd Party Version: 11.0(3)SR3 Version: 11.0(2)SR1 Version: 11.5(1) Version: 11.0(5)SR2 Version: 11.0(2) Version: 11.7(1) Version: 11.0(4)SR3 Version: 11.0(0.7) MPP Version: 11.0(4)SR2 Version: 11.0(3)SR5 Version: 11.0(3)SR6 Version: 11.0(3) Version: 11.0(4)SR1 Version: 11.0(1) MPP Version: 11.0(4) Version: 11.0(3)SR4 Version: 11.0(5) Version: 11.0(3)SR1 Version: 11.0(5)SR1 Version: 11.0(3)SR2 Version: 11.0(2)SR2 Version: 11.0(1) Version: 11.5(1)SR1 Version: 11-0-1MSR1-1 Version: 10.4(1) 3rd Party Version: 10.3(1.11) 3rd Party Version: 10.2(2) Version: 10.2(1)SR1 Version: 10.1(1.9) Version: 10.1(1)SR2 Version: 10.2(1) Version: 10.1(1)SR1 Version: 10.4(1)SR2 3rd Party Version: 10.3(1) Version: 10.3(1)SR4b Version: 10.3(1)SR5 Version: 10.3(1.9) 3rd Party Version: 10.3(2) Version: 10.3(1)SR4 Version: 10.3(1)SR2 Version: 10.3(1)SR3 Version: 10.3(1)SR1 Version: 12.6(1) Version: 12.1(1) Version: 12.5(1)SR1 Version: 12.5(1)SR2 Version: 12.5(1) Version: 12.5(1)SR3 Version: 12.6(1)SR1 Version: 12.7(1) Version: 12.1(1)SR1 Version: 12.0(1) Version: 12.0(1)SR2 Version: 12.0(1)SR1 Version: 12.0(1)SR3 Version: 12.8(1) Version: 12.8(1)SR1 Version: 12.8(1)SR2 Version: 11.0(5)SR3 Version: 11.0(6) Version: 11.0(6)SR1 Version: 11.0(6)SR2 Version: 10.3(1)SR6 Version: 10.3(1)SR7 Version: 12.7(1)SR1 Version: 14.0(1)SR1 Version: 14.0(1) Version: 14.0(1)SR2 Version: 14.0(1)SR3 Version: 14.1(1) Version: 14.1(1)SR1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ip-phone-auth-bypass-pSqxZRPR", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Session Initiation Protocol (SIP) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.3(4) 3rd Party" }, { "status": "affected", "version": "9.3(4)SR3 3rd Party" }, { "status": "affected", "version": "9.3(4)SR1 3rd Party" }, { "status": "affected", "version": "9.3(4)SR2 3rd Party" }, { "status": "affected", "version": "11.0(3)SR3" }, { "status": "affected", "version": "11.0(2)SR1" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.0(5)SR2" }, { "status": "affected", "version": "11.0(2)" }, { "status": "affected", "version": "11.7(1)" }, { "status": "affected", "version": "11.0(4)SR3" }, { "status": "affected", "version": "11.0(0.7) MPP" }, { "status": "affected", "version": "11.0(4)SR2" }, { "status": "affected", "version": "11.0(3)SR5" }, { "status": "affected", "version": "11.0(3)SR6" }, { "status": "affected", "version": "11.0(3)" }, { "status": "affected", "version": "11.0(4)SR1" }, { "status": "affected", "version": "11.0(1) MPP" }, { "status": "affected", "version": "11.0(4)" }, { "status": "affected", "version": "11.0(3)SR4" }, { "status": "affected", "version": "11.0(5)" }, { "status": "affected", "version": "11.0(3)SR1" }, { "status": "affected", "version": "11.0(5)SR1" }, { "status": "affected", "version": "11.0(3)SR2" }, { "status": "affected", "version": "11.0(2)SR2" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)SR1" }, { "status": "affected", "version": "11-0-1MSR1-1" }, { "status": "affected", "version": "10.4(1) 3rd Party" }, { "status": "affected", "version": "10.3(1.11) 3rd Party" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "10.2(1)SR1" }, { "status": "affected", "version": "10.1(1.9)" }, { "status": "affected", "version": "10.1(1)SR2" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "10.1(1)SR1" }, { "status": "affected", "version": "10.4(1)SR2 3rd Party" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(1)SR4b" }, { "status": "affected", "version": "10.3(1)SR5" }, { "status": "affected", "version": "10.3(1.9) 3rd Party" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "10.3(1)SR4" }, { "status": "affected", "version": "10.3(1)SR2" }, { "status": "affected", "version": "10.3(1)SR3" }, { "status": "affected", "version": "10.3(1)SR1" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.5(1)SR1" }, { "status": "affected", "version": "12.5(1)SR2" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SR3" }, { "status": "affected", "version": "12.6(1)SR1" }, { "status": "affected", "version": "12.7(1)" }, { "status": "affected", "version": "12.1(1)SR1" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.0(1)SR2" }, { "status": "affected", "version": "12.0(1)SR1" }, { "status": "affected", "version": "12.0(1)SR3" }, { "status": "affected", "version": "12.8(1)" }, { "status": "affected", "version": "12.8(1)SR1" }, { "status": "affected", "version": "12.8(1)SR2" }, { "status": "affected", "version": "11.0(5)SR3" }, { "status": "affected", "version": "11.0(6)" }, { "status": "affected", "version": "11.0(6)SR1" }, { "status": "affected", "version": "11.0(6)SR2" }, { "status": "affected", "version": "10.3(1)SR6" }, { "status": "affected", "version": "10.3(1)SR7" }, { "status": "affected", "version": "12.7(1)SR1" }, { "status": "affected", "version": "14.0(1)SR1" }, { "status": "affected", "version": "14.0(1)" }, { "status": "affected", "version": "14.0(1)SR2" }, { "status": "affected", "version": "14.0(1)SR3" }, { "status": "affected", "version": "14.1(1)" }, { "status": "affected", "version": "14.1(1)SR1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "Authentication Bypass Using an Alternate Path or Channel", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:31.975Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ip-phone-auth-bypass-pSqxZRPR", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR" } ], "source": { "advisory": "cisco-sa-ip-phone-auth-bypass-pSqxZRPR", "defects": [ "CSCwc37223", "CSCwc37234" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20018", "datePublished": "2023-01-19T01:35:41.006Z", "dateReserved": "2022-10-27T18:47:50.308Z", "dateUpdated": "2024-08-02T08:57:35.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1922
Vulnerability from cvelistv5
Published
2019-07-06 01:25
Modified
2024-11-21 19:19
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 8800 Series Software |
Version: unspecified < 12.0(1)MN130 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:51.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1922", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:57:53.270805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:19:37.597Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 8800 Series Software", "vendor": "Cisco", "versions": [ { "lessThan": "12.0(1)MN130", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-06T01:25:11", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos" } ], "source": { "advisory": "cisco-sa-20190703-ip-phone-sip-dos", "defect": [ [ "CSCvc61672" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1922", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 8800 Series Software", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "12.0(1)MN130" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos" } ] }, "source": { "advisory": "cisco-sa-20190703-ip-phone-sip-dos", "defect": [ [ "CSCvc61672" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1922", "datePublished": "2019-07-06T01:25:11.206035Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:19:37.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24587
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-01T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "url": "https://www.fragattacks.com" }, { "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24587", "datePublished": "2021-05-11T00:00:00", "dateReserved": "2020-08-21T00:00:00", "dateUpdated": "2024-08-04T15:19:08.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0316
Vulnerability from cvelistv5
Published
2018-06-07 12:00
Modified
2024-11-29 15:06
Severity ?
EPSS score ?
Summary
A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041073 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco IP Phone 6800, 7800, and 8800 Series unknown |
Version: Cisco IP Phone 6800, 7800, and 8800 Series unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041073", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041073" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0316", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:43:52.166934Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T15:06:41.852Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 6800, 7800, and 8800 Series unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IP Phone 6800, 7800, and 8800 Series unknown" } ] } ], "datePublic": "2018-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-13T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1041073", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041073" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 6800, 7800, and 8800 Series unknown", "version": { "version_data": [ { "version_value": "Cisco IP Phone 6800, 7800, and 8800 Series unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "1041073", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041073" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0316", "datePublished": "2018-06-07T12:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T15:06:41.852Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16008
Vulnerability from cvelistv5
Published
2020-01-26 04:45
Modified
2024-11-15 17:44
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 7800 Series with Multiplatform Firmware |
Version: unspecified < n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200108 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-16008", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:29:41.207109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:44:17.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-26T04:45:30", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200108 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ], "source": { "advisory": "cisco-sa-20200108-iphone-xss", "defect": [ [ "CSCvq85331" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-01-08T16:00:00-0800", "ID": "CVE-2019-16008", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 7800 Series with Multiplatform Firmware", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20200108 Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ] }, "source": { "advisory": "cisco-sa-20200108-iphone-xss", "defect": [ [ "CSCvq85331" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-16008", "datePublished": "2020-01-26T04:45:30.615870Z", "dateReserved": "2019-09-06T00:00:00", "dateUpdated": "2024-11-15T17:44:17.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-34711
Vulnerability from cvelistv5
Published
2021-10-06 19:46
Modified
2024-11-07 21:48
Severity ?
EPSS score ?
Summary
A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20211006 Cisco IP Phone Software Arbitrary File Read Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34711", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:40:04.866442Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:48:26.126Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-36", "description": "CWE-36", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T19:46:32", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20211006 Cisco IP Phone Software Arbitrary File Read Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow" } ], "source": { "advisory": "cisco-sa-ipphone-arbfileread-NPdtE2Ow", "defect": [ [ "CSCvx85812", "CSCvx85813", "CSCvx85818", "CSCvx85820", "CSCvx85821", "CSCvx85822", "CSCvx85824" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone Software Arbitrary File Read Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34711", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone Software Arbitrary File Read Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phones with Multiplatform Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.5", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-36" } ] } ] }, "references": { "reference_data": [ { "name": "20211006 Cisco IP Phone Software Arbitrary File Read Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow" } ] }, "source": { "advisory": "cisco-sa-ipphone-arbfileread-NPdtE2Ow", "defect": [ [ "CSCvx85812", "CSCvx85813", "CSCvx85818", "CSCvx85820", "CSCvx85821", "CSCvx85822", "CSCvx85824" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34711", "datePublished": "2021-10-06T19:46:32.157323Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:48:26.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0341
Vulnerability from cvelistv5
Published
2018-07-16 17:00
Modified
2024-11-29 14:55
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco Bug IDs: CSCvi51426.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104731 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1041285 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco IP Phone 6800, 7800, and 8800 unknown |
Version: Cisco IP Phone 6800, 7800, and 8800 unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject" }, { "name": "104731", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104731" }, { "name": "1041285", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041285" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0341", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:49.674632Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:55:26.418Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 6800, 7800, and 8800 unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IP Phone 6800, 7800, and 8800 unknown" } ] } ], "datePublic": "2018-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco Bug IDs: CSCvi51426." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-17T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject" }, { "name": "104731", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104731" }, { "name": "1041285", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041285" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0341", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 6800, 7800, and 8800 unknown", "version": { "version_data": [ { "version_value": "Cisco IP Phone 6800, 7800, and 8800 unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco Bug IDs: CSCvi51426." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject" }, { "name": "104731", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104731" }, { "name": "1041285", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041285" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0341", "datePublished": "2018-07-16T17:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:55:26.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0332
Vulnerability from cvelistv5
Published
2018-06-07 21:00
Modified
2024-11-29 15:05
Severity ?
EPSS score ?
Summary
A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104445 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041074 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Unified IP Phone Software unknown |
Version: Cisco Unified IP Phone Software unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104445", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos" }, { "name": "1041074", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041074" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0332", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:43:46.497266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T15:05:00.083Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified IP Phone Software unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Unified IP Phone Software unknown" } ] } ], "datePublic": "2018-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-14T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104445", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos" }, { "name": "1041074", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041074" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Unified IP Phone Software unknown", "version": { "version_data": [ { "version_value": "Cisco Unified IP Phone Software unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "104445", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104445" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos" }, { "name": "1041074", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041074" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0332", "datePublished": "2018-06-07T21:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T15:05:00.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3161
Vulnerability from cvelistv5
Published
2020-04-15 20:10
Modified
2024-11-08 16:11
Severity ?
EPSS score ?
Summary
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP phone |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:24:00.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3161", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T16:11:11.668072Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3161" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T16:11:35.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP phone", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-04-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about the vulnerability that is described in this advisory. Cisco PSIRT is not aware of any malicious use of this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-17T16:05:59", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html" } ], "source": { "advisory": "cisco-sa-voip-phones-rce-dos-rB6EeRXs", "defect": [ [ "CSCuz03016", "CSCvs78272", "CSCvs78441" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-04-15T16:00:00-0700", "ID": "CVE-2020-3161", "STATE": "PUBLIC", "TITLE": "Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP phone", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about the vulnerability that is described in this advisory. Cisco PSIRT is not aware of any malicious use of this vulnerability." } ], "impact": { "cvss": { "baseScore": "9.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs" }, { "name": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html" } ] }, "source": { "advisory": "cisco-sa-voip-phones-rce-dos-rB6EeRXs", "defect": [ [ "CSCuz03016", "CSCvs78272", "CSCvs78441" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3161", "datePublished": "2020-04-15T20:10:11.570472Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-08T16:11:35.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0461
Vulnerability from cvelistv5
Published
2019-01-10 16:00
Modified
2024-11-19 19:19
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106515 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 8800 Series Software |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:10.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106515", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106515" }, { "name": "20190109 Cisco IP Phone 8800 Series Arbitrary Script Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0461", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:25:47.192182Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:19:17.507Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 8800 Series Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-11T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "106515", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106515" }, { "name": "20190109 Cisco IP Phone 8800 Series Arbitrary Script Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection" } ], "source": { "advisory": "cisco-sa-20190109-phone-script-injection", "defect": [ [ "CSCvm95999" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 8800 Series Arbitrary Script Injection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-01-09T16:00:00-0800", "ID": "CVE-2018-0461", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 8800 Series Arbitrary Script Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 8800 Series Software", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "106515", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106515" }, { "name": "20190109 Cisco IP Phone 8800 Series Arbitrary Script Injection Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection" } ] }, "source": { "advisory": "cisco-sa-20190109-phone-script-injection", "defect": [ [ "CSCvm95999" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0461", "datePublished": "2019-01-10T16:00:00Z", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-19T19:19:17.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26141
Vulnerability from cvelistv5
Published
2021-05-11 19:42
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:13:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26141", "datePublished": "2021-05-11T19:42:11", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1635
Vulnerability from cvelistv5
Published
2019-05-03 14:55
Modified
2024-11-19 19:09
Severity ?
EPSS score ?
Summary
A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Wireless IP Phone 8821 and 8821-EX |
Version: unspecified < 11.0(5) |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1635", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:24:33.589954Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:09:54.267Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Wireless IP Phone 8821 and 8821-EX", "vendor": "Cisco", "versions": [ { "lessThan": "11.0(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Cisco IP Phone 7800 Series and 8800 Series", "vendor": "Cisco", "versions": [ { "lessThan": "12.5(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-03T14:55:27", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos" } ], "source": { "advisory": "cisco-sa-20190501-phone-sip-xml-dos", "defect": [ [ "CSCvm39405", "CSCvo19825", "CSCvo21348", "CSCvo23532" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1635", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Wireless IP Phone 8821 and 8821-EX", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "11.0(5)" } ] } }, { "product_name": "Cisco IP Phone 7800 Series and 8800 Series", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "12.5(1)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos" } ] }, "source": { "advisory": "cisco-sa-20190501-phone-sip-xml-dos", "defect": [ [ "CSCvm39405", "CSCvo19825", "CSCvo21348", "CSCvo23532" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1635", "datePublished": "2019-05-03T14:55:27.291439Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:09:54.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20079
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2024-10-28 16:33
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20079", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:27:14.331307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:33:33.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-03T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230302 Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "source": { "advisory": "cisco-sa-ip-phone-cmd-inj-KMFynVcP", "defect": [ [ "CSCwc78400", "CSCwd39132", "CSCwd40474", "CSCwd40489", "CSCwd40494" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 6800, 7800, 7900, and 8800 Series Web UI Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20079", "datePublished": "2023-03-03T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:33:33.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20968
Vulnerability from cvelistv5
Published
2022-12-08 16:13
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device.
This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Session Initiation Protocol (SIP) Software |
Version: 9.3(4) 3rd Party Version: 9.3(4)SR3 3rd Party Version: 9.3(4)SR1 3rd Party Version: 9.3(4)SR2 3rd Party Version: 11.5(1) Version: 11.7(1) Version: 11.0(0.7) MPP Version: 11.0(1) MPP Version: 11.0(1) Version: 11.5(1)SR1 Version: 11-0-1MSR1-1 Version: 10.4(1) 3rd Party Version: 10.3(1.11) 3rd Party Version: 10.2(2) Version: 10.2(1)SR1 Version: 10.1(1.9) Version: 10.1(1)SR2 Version: 10.2(1) Version: 10.1(1)SR1 Version: 10.4(1)SR2 3rd Party Version: 10.3(1) Version: 10.3(1)SR4b Version: 10.3(1)SR5 Version: 10.3(1.9) 3rd Party Version: 10.3(2) Version: 10.3(1)SR4 Version: 10.3(1)SR2 Version: 10.3(1)SR3 Version: 10.3(1)SR1 Version: 12.6(1) Version: 12.1(1) Version: 12.5(1)SR1 Version: 12.5(1)SR2 Version: 12.5(1) Version: 12.5(1)SR3 Version: 12.6(1)SR1 Version: 12.7(1) Version: 12.1(1)SR1 Version: 12.0(1) Version: 12.0(1)SR2 Version: 12.0(1)SR1 Version: 12.0(1)SR3 Version: 12.8(1) Version: 12.8(1)SR1 Version: 12.8(1)SR2 Version: 10.3(1)SR6 Version: 10.3(1)SR7 Version: 12.7(1)SR1 Version: 14.0(1)SR1 Version: 14.0(1) Version: 14.0(1)SR2 Version: 14.0(1)SR3 Version: 14.1(1) Version: 14.1(1)SR1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:58.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ipp-oobwrite-8cMF5r7U", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Session Initiation Protocol (SIP) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.3(4) 3rd Party" }, { "status": "affected", "version": "9.3(4)SR3 3rd Party" }, { "status": "affected", "version": "9.3(4)SR1 3rd Party" }, { "status": "affected", "version": "9.3(4)SR2 3rd Party" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.7(1)" }, { "status": "affected", "version": "11.0(0.7) MPP" }, { "status": "affected", "version": "11.0(1) MPP" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)SR1" }, { "status": "affected", "version": "11-0-1MSR1-1" }, { "status": "affected", "version": "10.4(1) 3rd Party" }, { "status": "affected", "version": "10.3(1.11) 3rd Party" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "10.2(1)SR1" }, { "status": "affected", "version": "10.1(1.9)" }, { "status": "affected", "version": "10.1(1)SR2" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "10.1(1)SR1" }, { "status": "affected", "version": "10.4(1)SR2 3rd Party" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(1)SR4b" }, { "status": "affected", "version": "10.3(1)SR5" }, { "status": "affected", "version": "10.3(1.9) 3rd Party" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "10.3(1)SR4" }, { "status": "affected", "version": "10.3(1)SR2" }, { "status": "affected", "version": "10.3(1)SR3" }, { "status": "affected", "version": "10.3(1)SR1" }, { "status": "affected", "version": "12.6(1)" }, { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.5(1)SR1" }, { "status": "affected", "version": "12.5(1)SR2" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SR3" }, { "status": "affected", "version": "12.6(1)SR1" }, { "status": "affected", "version": "12.7(1)" }, { "status": "affected", "version": "12.1(1)SR1" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.0(1)SR2" }, { "status": "affected", "version": "12.0(1)SR1" }, { "status": "affected", "version": "12.0(1)SR3" }, { "status": "affected", "version": "12.8(1)" }, { "status": "affected", "version": "12.8(1)SR1" }, { "status": "affected", "version": "12.8(1)SR2" }, { "status": "affected", "version": "10.3(1)SR6" }, { "status": "affected", "version": "10.3(1)SR7" }, { "status": "affected", "version": "12.7(1)SR1" }, { "status": "affected", "version": "14.0(1)SR1" }, { "status": "affected", "version": "14.0(1)" }, { "status": "affected", "version": "14.0(1)SR2" }, { "status": "affected", "version": "14.0(1)SR3" }, { "status": "affected", "version": "14.1(1)" }, { "status": "affected", "version": "14.1(1)SR1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device.\r\n\r\nThis vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory and that this vulnerability has been publicly discussed.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:28.167Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ipp-oobwrite-8cMF5r7U", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U" } ], "source": { "advisory": "cisco-sa-ipp-oobwrite-8cMF5r7U", "defects": [ "CSCwb28354" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20968", "datePublished": "2022-12-08T16:13:11.258Z", "dateReserved": "2021-11-02T13:28:29.197Z", "dateUpdated": "2024-08-03T02:31:58.569Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24588
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-01T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "url": "https://www.fragattacks.com" }, { "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24588", "datePublished": "2021-05-11T00:00:00", "dateReserved": "2020-08-21T00:00:00", "dateUpdated": "2024-08-04T15:19:08.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1684
Vulnerability from cvelistv5
Published
2019-02-21 20:00
Modified
2024-11-21 19:45
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation for the Cisco IP Phone 7800 and 8800 Series could allow an unauthenticated, adjacent attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. Versions prior to 12.6(1)MN80 are affected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107104 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IP Phone 8800 Series Software |
Version: unspecified < 12.6(1)MN80 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:41.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190220 Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol and Link Layer Discovery Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos" }, { "name": "107104", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107104" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1684", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:00:28.716175Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:45:06.009Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IP Phone 8800 Series Software", "vendor": "Cisco", "versions": [ { "lessThan": "12.6(1)MN80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation for the Cisco IP Phone 7800 and 8800 Series could allow an unauthenticated, adjacent attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. Versions prior to 12.6(1)MN80 are affected." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-22T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190220 Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol and Link Layer Discovery Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos" }, { "name": "107104", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107104" } ], "source": { "advisory": "cisco-sa-20190220-cdp-lldp-dos", "defect": [ [ "CSCvn47250" ] ], "discovery": "INTERNAL" }, "title": "Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol and Link Layer Discovery Protocol Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-02-20T16:00:00-0800", "ID": "CVE-2019-1684", "STATE": "PUBLIC", "TITLE": "Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol and Link Layer Discovery Protocol Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IP Phone 8800 Series Software", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "12.6(1)MN80" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation for the Cisco IP Phone 7800 and 8800 Series could allow an unauthenticated, adjacent attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. Versions prior to 12.6(1)MN80 are affected." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20190220 Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol and Link Layer Discovery Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos" }, { "name": "107104", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107104" } ] }, "source": { "advisory": "cisco-sa-20190220-cdp-lldp-dos", "defect": [ [ "CSCvn47250" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1684", "datePublished": "2019-02-21T20:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:45:06.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20221
Vulnerability from cvelistv5
Published
2023-08-16 21:01
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: 11.3.1 MSR2-6 Version: 11.3.1 MSR3-3 Version: 11.3.2 Version: 11.3.3 Version: 11.3.4 Version: 11.3.5 Version: 11.3.3 MSR1 Version: 11.3.6 Version: 11-3-1MPPSR4UPG Version: 11.3.7 Version: 11-3-1MSR2UPG Version: 11.3.6SR1 Version: 11.3.7SR1 Version: 11.3.7SR2 Version: 11.0.0 Version: 11.0.1 Version: 11.0.1 MSR1-1 Version: 11.0.2 Version: 11.1.1 Version: 11.1.1 MSR1-1 Version: 11.1.1 MSR2-1 Version: 11.1.2 Version: 11.1.2 MSR1-1 Version: 11.1.2 MSR3-1 Version: 11.2.1 Version: 11.2.2 Version: 11.2.3 Version: 11.2.3 MSR1-1 Version: 11.2.4 Version: 11.3.1 Version: 11.3.1 MSR1-3 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ipphone-csrf-HOCmXW2c", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.3.1 MSR2-6" }, { "status": "affected", "version": "11.3.1 MSR3-3" }, { "status": "affected", "version": "11.3.2" }, { "status": "affected", "version": "11.3.3" }, { "status": "affected", "version": "11.3.4" }, { "status": "affected", "version": "11.3.5" }, { "status": "affected", "version": "11.3.3 MSR1" }, { "status": "affected", "version": "11.3.6" }, { "status": "affected", "version": "11-3-1MPPSR4UPG" }, { "status": "affected", "version": "11.3.7" }, { "status": "affected", "version": "11-3-1MSR2UPG" }, { "status": "affected", "version": "11.3.6SR1" }, { "status": "affected", "version": "11.3.7SR1" }, { "status": "affected", "version": "11.3.7SR2" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.1 MSR1-1" }, { "status": "affected", "version": "11.0.2" }, { "status": "affected", "version": "11.1.1" }, { "status": "affected", "version": "11.1.1 MSR1-1" }, { "status": "affected", "version": "11.1.1 MSR2-1" }, { "status": "affected", "version": "11.1.2" }, { "status": "affected", "version": "11.1.2 MSR1-1" }, { "status": "affected", "version": "11.1.2 MSR3-1" }, { "status": "affected", "version": "11.2.1" }, { "status": "affected", "version": "11.2.2" }, { "status": "affected", "version": "11.2.3" }, { "status": "affected", "version": "11.2.3 MSR1-1" }, { "status": "affected", "version": "11.2.4" }, { "status": "affected", "version": "11.3.1" }, { "status": "affected", "version": "11.3.1 MSR1-3" } ] }, { "product": "Cisco PhoneOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:23.679Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ipphone-csrf-HOCmXW2c", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" } ], "source": { "advisory": "cisco-sa-ipphone-csrf-HOCmXW2c", "defects": [ "CSCwc78409", "CSCwc81103", "CSCwc78412" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20221", "datePublished": "2023-08-16T21:01:05.872Z", "dateReserved": "2022-10-27T18:47:50.368Z", "dateUpdated": "2024-08-02T09:05:35.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26140
Vulnerability from cvelistv5
Published
2021-05-11 19:34
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T14:11:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.fragattacks.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "name": "https://www.fragattacks.com", "refsource": "MISC", "url": "https://www.fragattacks.com" }, { "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", "refsource": "MISC", "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26140", "datePublished": "2021-05-11T19:34:42", "dateReserved": "2020-09-29T00:00:00", "dateUpdated": "2024-08-04T15:49:07.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2C083CF-3D4D-4AF0-8461-835F6AC264CC", "versionEndExcluding": "4.4.271", "versionStartIncluding": "4.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "11580478-2F79-45B8-9BC0-FEF28259A4F5", "versionEndExcluding": "4.9.271", "versionStartIncluding": "4.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E", "versionEndExcluding": "4.14.235", "versionStartIncluding": "4.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", "versionEndExcluding": "4.19.193", "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", "versionEndExcluding": "5.4.124", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", "versionEndExcluding": "5.10.42", "versionStartIncluding": "5.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", "versionEndExcluding": "5.12.9", "versionStartIncluding": "5.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed." }, { "lang": "es", "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que todos los fragmentos de una trama est\u00e9n cifrados con la misma clave. Un adversario puede abusar de esto para descifrar fragmentos seleccionados cuando otro dispositivo env\u00eda tramas fragmentadas y la clave de cifrado WEP, CCMP o GCMP es peri\u00f3dicamente renovada" } ], "id": "CVE-2020-24587", "lastModified": "2024-11-21T05:15:05.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.2, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 07:15
Modified
2024-11-21 07:40
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3603E753-AD60-4AF0-8FA8-A371260CB0C1", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF03D5F2-0483-409B-90F0-A1430774A258", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40DA5ABA-C866-4560-BE21-77B2643E8DB6", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BABDE4DB-5BAA-448E-B009-D872FC515237", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CCABEA0-842F-449C-BE24-4B1BDD32F9BF", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7667725-6B7B-4A04-890D-7487B58EC256", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "702F4804-A675-4222-9AAE-2C5EF7D99001", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02291A1F-29F1-4972-9CD9-E09116DF80C5", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1BBEA07-3154-4270-B865-D4AD26EB3B42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F8D7A6A-1279-42A9-9FE9-1F6C8F765D17", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A4D6EB2-404C-48CD-9F24-4845A95BA0AE", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAFDFD58-C58F-4967-9E85-6FAE66346E37", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE56B858-B59D-4197-9B2A-33A03908B967", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5334C11E-B07E-49A5-95CA-536630CEA788", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AA83664-C710-4B45-B09F-3E29A2EB6638", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1C26834-45D8-4B0D-A08C-BE0594EEAB4F", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33C51A07-3C77-4DDC-9C4F-E5E3BE55268E", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2196ED9F-DA82-4D70-9BC2-97673A96B881", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFBDA235-4866-4058-82F5-27297E1923BF", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9249A092-250D-4BB8-AEEA-3B2190246223", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phones_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24A5CEB2-54CA-46D0-872D-90AAB39C9023", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phones_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B980D4B-63D0-4786-AD62-FFE49FED33FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_8851nr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18741BE2-B397-4F53-9845-4CB8AF7E65DD", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_8851nr:-:*:*:*:*:*:*:*", "matchCriteriaId": "B021B260-CD3C-4EA5-9A2C-FE80B4ACA787", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_8865nr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CEC15D2-210D-49B1-898D-591AA318CC82", "versionEndExcluding": "14.1\\(1\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_8865nr:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EB7D543-296F-44AE-9335-BF3244F21E55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503FE588-7543-45A1-A742-4657A5CC2DE8", "versionEndExcluding": "11.0\\(6\\)sr4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09F02957-0FED-4D40-B42D-529C0FCEF252", "versionEndExcluding": "11.0\\(6\\)sr4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los tel\u00e9fonos Cisco IP Phone de las series 7800 y 8800 podr\u00eda permitir que un atacante remoto no autenticado omita la autenticaci\u00f3n en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud manipulada a la interfaz de administraci\u00f3n basada en web. Un exploit exitoso podr\u00eda permitir al atacante acceder a ciertas partes de la interfaz web que normalmente requerir\u00edan autenticaci\u00f3n." } ], "id": "CVE-2023-20018", "lastModified": "2024-11-21T07:40:21.247", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-20T07:15:13.633", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-288" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", "matchCriteriaId": "5F2558DF-2D1F-46BA-ABF1-08522D33268E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "68C08ECE-4D09-4E57-920B-B8E94E81603A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F5154A83-2499-4756-9150-8BFD9ACEF583", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "7CC235C6-63B1-4085-B9AA-47EFB17A144D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "54C41A49-87FA-4C98-8321-2808712B2F68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F8ED25D1-973F-481A-8550-16508F73D2D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "35918620-E4C5-4E46-A5A9-63009333667A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "27440732-54F0-40DF-9896-88D60ABC568A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", "matchCriteriaId": "FC39A276-532B-428A-83BA-141B626281A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "93103556-6C4A-4D35-91D1-5CDCDC740655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5DEFC044-1D95-4386-AABB-ADE1099E3F85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "42759A0F-70C6-41DB-9DF9-2BC05685F678", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "95662406-0D7D-45B2-95F5-582FA275AC89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "A0E9FB66-F577-4744-B51F-3BD25293109F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "079DA749-0B94-4CCF-A3B1-7669DA213B52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D96A05C3-1549-47DD-BADA-7872246EBDA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "2E7375AB-BE32-4879-BB54-CF5EDAB98188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0E9E26B8-1539-4E21-AEAA-45095F79382A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "19C73CA1-2F92-4635-8D38-812D6D8ACD89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "EA17907A-388A-42E7-ACC6-2F59C72C93F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "A53A71EB-C346-42CD-AD58-F83F809D0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "90E87633-CD6E-439B-9CE8-66A1E414F09D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "742D9262-4329-4F0A-B97E-5FC65786946F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "FC14C45F-FDFB-4AAC-94EC-45860051379F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "C01E79D8-5F48-4939-BFD6-B363A76769D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CEE50FA1-6616-402A-9D86-9725206612C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5B907930-CA5C-4160-A3D1-8ACB559C9143", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "9331282F-B426-40DC-869E-F6F7DFE959A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "C67D4B91-66EB-490E-B43D-A7E159CC543B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "45A6A314-804B-47DC-B35E-804AD89588D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "968D60A4-036A-4792-BE8E-88F8B26444DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "754B93BA-0451-4C09-A124-284A62189D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "85293635-DD43-4651-8605-4F27F228AA91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "826FB2F4-45B5-4360-B577-11F75A1B67A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F3417E19-D7FC-487D-B316-B826DB3CB712", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "B66B6DB7-E48C-4758-915E-E4096CC5D68E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "69C3A33C-85E1-4157-81F7-39FA271CF8ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "E65FB9EC-A750-44C9-B251-5D8697C29EC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7948D988-3ED9-49BE-B820-15728DA93D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B465A44-EC90-41C6-BD9B-59D3B7E49540", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", "matchCriteriaId": "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA329302-48FE-43FB-A15D-C3BEFB5AE868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", "matchCriteriaId": "37055F7B-2F2A-4B80-AC34-CAB0568BC692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534CF2AE-2149-4599-AC43-13EE8048B3EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB15599-F795-4D24-A4A6-CD826F6A7A13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "441DF280-FC8C-481F-BDB9-7D757CF5BB72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "52BB9046-E47D-480A-93D2-DB0F76574E02", "versionEndExcluding": "4.4.271", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C01BF34A-CD21-4B2F-9877-C89B8202B09A", "versionEndExcluding": "4.9.271", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E", "versionEndExcluding": "4.14.235", "versionStartIncluding": "4.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", "versionEndExcluding": "4.19.193", "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", "versionEndExcluding": "5.4.124", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", "versionEndExcluding": "5.10.42", "versionStartIncluding": "5.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", "versionEndExcluding": "5.12.9", "versionStartIncluding": "5.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets." }, { "lang": "es", "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que el flag A-MSDU en el campo de encabezado QoS de texto plano est\u00e9 autenticada. Contra dispositivos que admiten la recepci\u00f3n de tramas A-MSDU que no son SSP (que es obligatorio como parte de 802.11n), un adversario puede abusar de esto para inyectar paquetes de red arbitrarios" } ], "id": "CVE-2020-24588", "lastModified": "2024-11-21T05:15:05.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-06 20:15
Modified
2024-11-21 06:11
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42261E2-07EC-416E-A65C-7D85584DED32", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B9BC28D-0BC0-45CB-A87B-59F407F3A210", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38F67250-E4D0-48BE-928E-EF1BB4005940", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD40B5EB-D356-42D4-9464-67D0481460A9", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC5F5CAF-F0C4-41E4-A455-FB6A4D700A23", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67895EA8-C707-4228-A8A2-4654E2B912CA", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F83ED1C8-1655-46EC-B1F5-4BD1D519057D", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41F875DA-AF0C-49CE-8BC5-DD1E0702FACF", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B85805E6-8B5D-4677-9DDA-2FF5FB8F23C0", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phones_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1898FC60-6633-4322-9046-E1B8B85FF850", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phones_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B980D4B-63D0-4786-AD62-FFE49FED33FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFACDCE6-95B3-45A7-86D3-18F3A78D5AF7", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "280BC438-AF6B-464B-A283-CE183C06E13B", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64E92C6B-5BA7-4C5F-B262-AE20F3951923", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E3B94C-BA7B-481A-AF4D-2FCF5E81D7B6", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9A7F857-A3D7-43DA-8E94-FDA0EE542C39", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A19DB2-1E3A-40AC-B265-878E9B568E8C", "versionEndExcluding": "11.0\\(6\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system." }, { "lang": "es", "value": "Una vulnerabilidad en el shell de depuraci\u00f3n del software de Cisco IP Phone podr\u00eda permitir a un atacante local autenticado leer cualquier archivo del sistema de archivos del dispositivo. Esta vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad al proporcionar una entrada dise\u00f1ada a un comando del shell de depuraci\u00f3n. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante leer cualquier archivo en el sistema de archivos del dispositivo" } ], "id": "CVE-2021-34711", "lastModified": "2024-11-21T06:11:01.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-06T20:15:09.587", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-36" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-03 16:15
Modified
2024-11-21 07:40
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FB46C93-0E51-42F3-8F94-40042A5CBF46", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AD2F635-094B-4883-BF55-B85B16AD773F", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BA7B78-4934-404F-B4DF-6C936460E05E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "470A77FC-6DD6-44B8-B332-79844AE06BB2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CB8846B-6B42-49AF-BFC9-85CF89CA4E56", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F675EDC-3F39-4BDA-B6BD-2A0C1075D1D8", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D9466BE-960D-41DD-A137-ABE2C3F6D4B4", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27EA4CE-9BA5-42B8-B1CE-5710A6207CC2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4550A390-A8D8-4857-8C66-EC6B1F8E322E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D975C4C2-9567-4F5C-BE6A-137AE321F9F0", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD1967-D870-4E21-BF1C-D712809077EB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACB956C5-4165-4C00-BC5C-F4D4C6270070", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E1D601-371E-4F90-B6F7-8A6B91C949AB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C4C70C3-D9D7-468C-B522-666EF6C01D20", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7609CA0-F9E8-47AB-A621-212DC124018E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D936075-78C7-4E1E-A2B1-1EB8B668E3F2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2691AABE-6E0A-422B-88B9-89E63D1436F3", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6579DD70-1AC9-42FC-9464-90523A7008E7", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7945g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E49D5D04-A5B9-461D-94A3-15676DD90CD6", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5980E646-CA07-4222-A9DD-A71306A4A678", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7965g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0587084E-0B87-46D3-A5D8-3FD7EBC826E1", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF30D1CC-D27F-49FF-9C63-BB890002D1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7975g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77D2870-D2C9-40D7-8877-F9E9AD4E1DF8", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA879B6-04D6-402A-8F38-8A7CB34D76F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "id": "CVE-2023-20079", "lastModified": "2024-11-21T07:40:30.230", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-03T16:15:10.380", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-03 15:29
Modified
2024-11-21 04:36
Severity ?
Summary
A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "9FD73D2F-1022-44A8-92BE-B71067B1024F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "363A9F49-5D70-4A6B-926E-64C981201E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "0746182E-EE0F-44A9-BFFA-113943E25C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "B5AB6067-68C7-4922-A02F-A7F93F52BAB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "CC1252DE-9802-49F8-99C9-B125D3293C40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "44EFD14D-4C69-4437-A72F-6B49247D26A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "FB56EF0C-C107-4F6A-8B85-F6BA70A2A705", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "885379ED-09FE-4FF4-9BF0-8892F0C1E58D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "D2088285-FDD2-416F-AC19-ABF0E2F3B4D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "255EE0C9-876C-4363-B78A-5E10FE27A2C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3A43FC86-07E5-4014-B234-022A271558E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "256E6A12-D2F3-4791-BE21-25AAD05A485D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "54CCAE81-1F36-46FA-AF1A-CE4FF483642B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "91DB84C4-34F8-49A0-B549-E0D0A704A11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4579AF4D-761B-428A-A8C2-5070D1D7099C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8522666F-B6A8-4307-9476-E2FF15127758", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "8C282581-0202-40BD-B199-1A68AC97B096", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "6FD0F281-2C1F-4E23-94DB-CE241B572549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4DBA0C82-3B4F-4D4F-93D6-7FE16A527E8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "28216EED-6ADC-4257-9A0C-4F6F9B5252CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "6ADD6BEF-D247-4CC4-94B8-56CB9B2F71A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "D13F84C8-B683-43E4-BC42-3A3C8E8D9062", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3C30C018-94D3-4F44-9BF7-5709720CE0F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1A89D9DB-422E-4B46-B36B-D99F22115298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "2C43C8F5-997D-4162-A821-18B043F736AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "9396CE51-CFEC-43B6-B166-BADE75A4095A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3820F81F-1185-4912-892C-683D8743211E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F04D29EB-7D9F-43A7-B1B0-0720ADCE91D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "7A9C7468-B4E3-40BB-B458-1C2C72B4F78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "42900209-06A4-4C14-AD3D-E20003B806E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "94A3926A-AEFE-4B09-847B-9EC65DC1CED4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A214FBBD-D9BA-4C0B-8FD3-D63726FA56FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "5ABC02B3-31D9-404A-87D1-59C3DB491B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "B0440050-1892-4494-9E4E-1501A1ADB95A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "1A54102B-AFBA-4712-81EA-A516DAE2BEF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "992DEC8F-60D0-45E3-83D3-20239100DD6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "C7471753-87C9-41DC-B03A-0AA4EF7AB9EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "49AAD418-5E3B-4DBC-BC5E-E71202502646", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7DE8DD75-E8CB-43F5-8BAD-43A7723099C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C350795-5886-4046-8BD0-98E6A8356803", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "14EA7D1C-DFCD-48E1-AC9A-D3E65EE4B034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "614A66E5-6ACB-4F2C-BF71-98DB797CD8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E781A6F7-BD75-41E3-AE5B-122D2CF7AE08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "86A0C561-5AD6-4183-892C-362FE8F4D5D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "69E0BE44-A21A-41FF-AF39-4ADCCE1BC7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "0F51E412-0F60-4652-B02E-ECBCE95896C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "58F6DC75-CB97-4862-9C6B-D606DBA9C53E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D9B80E4A-348E-4105-86C0-7A41C3E1566B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone1_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "8BF34B4E-4AEC-4905-9682-40F36C28E7F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone1_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "11013BA7-1921-4D28-9C53-38DA027A4EA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone1_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "514FD53A-9705-40B1-8B9D-8AB7915D61ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone1_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4F6554D1-948A-4DEB-82BF-9502F9A2FE5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_8831_conference_phone1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B40CABF-34A1-418E-A325-118E7BE3B30D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone_for_third-party_call_control2_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "DB8E2293-B99B-4712-9141-BB9B08F49E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone_for_third-party_call_control2_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "50AC0158-05D4-43F4-8672-896547291728", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone_for_third-party_call_control2_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "58EF3AB3-963F-4AFE-A90F-F5481C4F470D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_ip_8831_conference_phone_for_third-party_call_control2_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "7D92C1FD-2D4C-4E71-B80D-D03A4715D409", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_8831_conference_phone_for_third-party_call_control2:-:*:*:*:*:*:*:*", "matchCriteriaId": "00904062-5E08-4DC6-807D-D3C86E6408C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "A329AA28-EEDE-45B4-B257-1C9D6AC16120", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "DC82A672-0A91-4237-9D78-62BA22DA21AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EC55AC07-54E1-4E92-A451-033C42B98566", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "573AB0AB-8F11-4C29-A502-E116DF493C5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "3A34E38C-C35A-423B-93EE-ADCE6DBCE389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "2F638402-3932-4877-B5F8-553262C00D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:11.0\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "0334BAF9-4566-4466-9457-DA9A064A8F5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "0BE3305F-E427-4F11-BFD8-AD5FE2FE6731", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de manejo de llamadas (call-handling) del Software Session Initiation Protocol (SIP) para tel\u00e9fonos IP 7800 Series y 8800 Series de Cisco, podr\u00eda permitir que un atacante remoto no identificado haga que un tel\u00e9fono afectado se recargue inesperadamente, resultando en una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS ) temporal. La vulnerabilidad es debido a un manejo de errores incompleto cuando los datos XML dentro de un paquete SIP son analizados. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete SIP que contiene una carga XML maliciosa a un tel\u00e9fono afectado. Una operaci\u00f3n \u00e9xito podr\u00eda permitir al atacante hacer que el tel\u00e9fono afectado se recargue inesperadamente, resultando en una condici\u00f3n DoS temporal." } ], "id": "CVE-2019-1635", "lastModified": "2024-11-21T04:36:58.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-03T15:29:00.713", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-16 17:29
Modified
2024-11-21 03:38
Severity ?
Summary
A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco Bug IDs: CSCvi51426.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104731 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1041285 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104731 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041285 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ip_phone_multiplatform_firmware | 11.1\(2\) | |
cisco | ip_phone_6841 | - | |
cisco | ip_phone_6851 | - | |
cisco | ip_phone_7811 | - | |
cisco | ip_phone_7821 | - | |
cisco | ip_phone_7841 | - | |
cisco | ip_phone_7861 | - | |
cisco | ip_phone_8811 | - | |
cisco | ip_phone_8841 | - | |
cisco | ip_phone_8845 | - | |
cisco | ip_phone_8851 | - | |
cisco | ip_phone_8861 | - | |
cisco | ip_phone_8865 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_multiplatform_firmware:11.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3141BE5B-06DF-4ED6-A2EA-EDBA0E1C8238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco Bug IDs: CSCvi51426." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de usuario web de Cisco IP Phone Series 6800, 7800 y 8800 con firmware multiplataforma en versiones anteriores a la 11.2(1) podr\u00eda permitir que un atacante remoto autenticado realice una inyecci\u00f3n de comandos y ejecute comandos con los privilegios del servidor web. Esta vulnerabilidad se debe a una validaci\u00f3n de entradas insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad incluyendo comandos shell arbitrarios en un campo de entrada de usuario espec\u00edfico. Cisco Bug IDs: CSCvi51426." } ], "id": "CVE-2018-0341", "lastModified": "2024-11-21T03:38:01.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-16T17:29:00.237", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104731" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041285" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-12 09:15
Modified
2024-11-21 06:43
Severity ?
8.1 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device.
This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5806DB1-1537-4CC2-9E0C-2AAD9322255D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FE2E4DF-34F4-42EB-8A6A-DE1DBD033168", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5230FF94-2EB6-44DF-8D2D-8A590F70480E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "FE1CE171-A42D-485B-B5E4-615050102409", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "D2088285-FDD2-416F-AC19-ABF0E2F3B4D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "61A75697-D2E9-4BE2-9F84-38DD1E75E394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "5128A9AA-50DE-4B82-919E-21D8B589C75D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "0699A230-89BA-4C5B-8D17-8410CFBB003B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E4FEFA16-1E2B-4525-BC38-1652D7D7B4AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "B956787C-0188-4AB5-BD5B-27D51AB0BCB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "903A4939-12E8-441E-BD06-7586E54E4B0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7389CE81-6A14-4175-882E-1F76082E645A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "0FA1BAE0-BBCE-4632-A042-02534E93D806", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C89184C7-28B9-4575-AC25-B4C7A1DD4CAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "5B208F33-D957-4215-AEAB-C022737E926B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "56969AC4-6F74-4F41-A43E-3CAA78E9704A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "255EE0C9-876C-4363-B78A-5E10FE27A2C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "26C52EB5-184F-485D-8A83-E183AEEAE87B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "BCD3C21D-9D3C-4399-867D-AB06AD153F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "CA59B757-5D67-47BE-B324-377260627080", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FEAA3BE-C448-46BE-9E93-F09F2B9C966D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "223BB9AB-6E37-4B10-9744-F70018574150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D490C3BD-61E0-4F69-A462-866F75DFA5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "39470312-4E3D-4952-B4F7-BBAA2CA629DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "704EC897-5798-4E7E-9A1E-F875ECB2A3CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "8A7BEE73-5975-4D59-89DF-433BB830BC66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2C61D51C-53C8-43D5-90E2-D5002967C5E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D715BDD-D977-4581-BA09-A2936991CFA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0627FB87-C24C-43CB-B770-E46635BC36CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A53EA48C-7B1C-40D5-A224-C46BFD7346E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A1292CC-C404-4E9C-BA59-1C1BA5BEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9DE1AA79-8ED3-4CA4-B7A1-7302852C7932", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3D2C3620-5007-48AC-A3E8-4B34521ADB60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "AE8818EC-0A87-4346-A868-C5904349B99F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "E92D5843-14E5-4CB7-B201-DCE3130C2F3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E59D582B-19E8-45C0-9878-791D4C91C8CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "256E6A12-D2F3-4791-BE21-25AAD05A485D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B11440C6-7BA0-46F9-98F0-F5CD75247670", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "527EBB3D-BBAF-4F2D-81CD-D63546F4F575", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3152E497-424D-40CA-ADB3-F11FDEF4D994", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "E8A9CEDA-9654-443A-8946-FE9929BC5C0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F0B3706-64B5-4EEE-8509-6BEFD6D45491", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "78030364-28B3-46F8-BD71-30C18EE17219", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0CAF70F0-CB2C-4509-A52D-8507A5CA32C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C30C77DE-2F6C-4C71-A5BA-779B753FA9FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22FF4EA6-2780-46B4-8EE0-98BE3C375B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F84FDBB4-D980-4FEB-9708-F1A651B73B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "905D5B48-BA48-496D-A02B-F2C787283E3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6ACB1673-4CE5-423A-8326-241B9758F9E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F4C21E53-C92E-4F72-B4BF-C3CDF3666442", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "DD8618BB-FD1F-45A9-BF03-9604C7E0C9FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "FDDB2E45-D433-4FD0-AE61-3B37894D67C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "65CDE4CD-D9A9-432B-B1CD-A6135F0C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "24610276-2F2C-41DC-8423-F58EFB066034", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8FA31A63-9FFB-4CD8-BEE8-0981BB521469", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD573532-1AF6-45AD-80BD-52D600F6D588", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "BAE44FFA-6DE7-4FF4-8F6C-671E8F2B0BA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "AFC3C126-9210-4FC6-93A1-A6676454FC0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "54CCAE81-1F36-46FA-AF1A-CE4FF483642B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "79845C49-1BFC-454C-8D15-DB959FB4DE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4947F49C-B6EC-4774-A3D4-B45F25890504", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B7F814A-6D27-4106-8AAA-96D515DAFF70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6832BEA-DA14-447A-A9C9-B58C3E3346ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8C94101B-BB3A-4C13-AAE9-30C9D259E9EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "063CFB79-48FF-49A9-8E10-83402F35135D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "40BA3270-FFB0-48F1-BCAA-3930728C78FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "2F93CF70-057A-4C0B-A77B-7968028C6202", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "49406087-4B94-4004-AAFD-201882B095F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "B000DAC3-3E5F-49E7-BB9C-B9266402BA7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "A35BA30A-49DD-4896-9408-BCE49F5AAC59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "91DB84C4-34F8-49A0-B549-E0D0A704A11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "8AEC481A-27A7-416F-A637-6479C60C5ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "8A0F1FCE-BCCB-40BB-93CE-DC22C1BDB7B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "F81199F6-2261-440C-9EE0-CA81C89CA7E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "7D5FCCF9-01D8-420E-9156-72E161F65764", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "90537619-F181-452D-BB01-D8C688A21BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "28709395-EDB9-4CF9-B627-EBCB217597CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4BCBF2F0-6700-435C-B332-6190E28C3178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B26A93DE-F671-4E15-BF32-FA26ED02B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "771A711B-B064-4D31-B966-C34D85D99A8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F97A2950-1EF4-4D11-B8A1-32504D496DDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B552853A-14E0-4339-A87E-7AE00BF143EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A011C304-8DD2-4CF3-A7B5-C11C1A306353", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E152416C-F84B-4BAB-AEFC-12F5F8DACB75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2D70506-7895-40A3-B68E-7F44A0ABD47A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5898827B-F26C-494D-BBBB-C7514ABF78CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A0D9062A-EDD7-40A6-84F3-6631AD4E0D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B5A3CD88-4122-4767-9AAC-3226A80A736F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "7FEF66AA-84F8-4AA2-9B92-1EB4482A1135", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "346216A4-8BE0-4435-89A4-ADE6B69AAAB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8522666F-B6A8-4307-9476-E2FF15127758", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F13D0E09-5C1C-446B-ADEB-ECBB1BB27428", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3A6AC4-2EFE-4B94-AD8F-DBE9038CB035", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "6FC06D89-4A96-4BB9-BA9E-D22C7052F9C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "81916162-3371-45F6-856F-6407041824DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CE61445-3802-467A-848C-78D29BBD1438", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9FFDF59D-5103-4228-9B24-07D6FD3E16AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F451FAC0-453C-4BBA-9F0C-752E38CA932F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6DB19EA7-07F4-4DCE-91AD-59192DEC5903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4B2FD46-2EBA-4198-88B9-A5D0D18C5F7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "B1BE7F70-9B04-49E0-8116-C3CE1258BF09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7C15C04F-289B-402B-A843-CB3787717A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F75FB5C-34F0-4EB9-BB2E-04E12E0468AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "83243669-181A-478C-AF2F-D2A9BAC4D6F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4840FDCB-E376-449F-9F8D-457891D504D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "58256D09-8704-4B21-963B-99C51BFD8635", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8BABC4A-369E-4396-84F2-B897112CD15E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6D8EDA64-DA4F-4633-8858-55CFB96C9ADF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "98BB9DBD-F9B8-463F-9E5A-B1685D685703", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "52791BA2-43C3-4284-9D0C-DD06B448B304", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "232E5CBE-8523-4587-B24E-34D76E1FBDCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "CEC40DCF-B63C-4519-80C1-BEB362799DFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "88F61BBC-D9B4-420D-8230-4357CF867642", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "072BF4BD-7112-4E33-8CA6-095E9FA9831B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8780257F-449D-4F51-BECE-CCA12FF8A7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "37812428-9BA7-4F83-BE73-DC3FDA712193", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0953F402-6941-4A66-A017-C44493EC2960", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D15FE50D-B248-49F0-B1DA-003A1FB3827F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F235444-DB09-460D-ABDA-294912A28D23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F654479-2F56-4D7A-8C95-8CEBB38EBC8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3A0DC91D-587B-4B35-B688-911E9C41793C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EC9C77FF-B551-4F91-911A-56D03164A4ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "003D2598-20E4-4AB4-8F83-82B6BE3F56B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "951D7658-3636-4898-8FDE-BAC811248409", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "272D91D6-A38A-45FD-A380-3A3333E52617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "974365D4-9FAB-48DA-BE01-F68C0322294D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "5FD783F4-E7BF-4020-A399-52FB78B1E6D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "A3A99E89-AD02-47F2-AB78-AD5359620CEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D068EF0-7A95-4907-A632-29730165C2AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "188D9E9F-F405-408C-AF7A-99644CE36E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4AF6E3-B9E1-4A2A-9C60-26371B8703D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5C9B878B-D0A5-47CB-B6CB-60F89B57BBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "35455671-E8C3-4B65-8A4D-02DA362633EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "96EEAC52-CC3C-42CF-A9C7-CF3D1431BCC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "226EB9CC-7CC2-4175-955A-76D63F35D656", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC2AA287-F608-4EBD-A7DE-33B33F88F760", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "03482518-825B-42BA-BBFF-7A95C5530A3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C70FA912-F201-45D8-B6BC-DE647CFB42FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "63BEC80C-C188-43E1-BE64-B20EFD0753CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "51C62E99-86A2-449A-92B1-3D4D9733B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D56AEB21-767A-4E48-A011-602172DF1735", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "301C8C89-7E5B-4F96-8582-04824D426E62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "3C5006DC-E009-479D-9366-650560B8E223", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0AD11AE4-100A-4F61-BC83-DDBCFC67A3AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1EE69104-47F2-40C9-B29A-8A131FE160B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4110FB61-D16C-4E9A-BAC2-E28522D1FABC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "271354E8-8CE6-444A-8CB3-8303E02DCAA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4E74E58B-5743-4080-97F6-38D4931BB58C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "5E15C086-2C08-4DD5-B29B-1F4B75805254", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "534E1F5F-507F-47E1-A1DA-D46BAE0F918B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5329C58C-50D5-4F46-AEE8-303855D1BFCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB7E04C4-8964-4008-A15E-1BBFC2FBCCE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "18175C0F-6730-419E-8406-7D88F6BEDAA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "371A8892-E727-4A86-9BBD-686DD5488FF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "64A0EAF3-0686-4670-9439-714A7E7AA94D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "95F4CE64-82F9-4E5E-A283-D941784A9C31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A088745D-08EB-4596-A6D1-FF2DBD357EC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5E97C5DB-D8EC-420A-AB6A-56C3FEB85F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8F9BEF83-49E8-4A96-8E4D-0416B432EF47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "4E455CFB-571A-4DAE-A996-829FE19B8C80", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3E0E6656-2715-4DF0-B098-B6BF11BB167C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "78328B55-4BBA-4B18-A7D4-F6A092935404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "152EBAF8-3F07-47FC-894B-64F87D3E6046", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "59FB8BD6-F4C0-4442-BE8E-7BB5616A3953", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "EF1A3F91-87C9-413F-9680-477006B14B44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "0ED977CF-B603-42B5-849D-7F71C3939B17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "8C282581-0202-40BD-B199-1A68AC97B096", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6BB4814C-CA15-4880-A6E6-A6D7B697F28D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "17DBE2A6-D21B-4E29-9231-5B9A73DB416A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "C89BF63B-121A-454B-9445-792C6CC4EB62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD38EE52-7E1D-479B-AF68-07313036EF15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "EFAE6F3F-A773-4561-871B-B34F48AEF7AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D54B7F8A-010E-4A70-A802-59881B347E7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5964B9A0-8485-4B57-A3E4-3A8F034F58AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C5225CF5-D7F3-47B4-8B55-350FBBDF7089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "F04AF4FD-00D7-44F3-87CF-9A205919DCB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "9EBA7A82-A14D-4471-A900-AACF26BAB7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "7AA726F0-5755-42FB-96B5-82F66F6CF3DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "6FD0F281-2C1F-4E23-94DB-CE241B572549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "16C4E279-FB61-4671-8219-1748C6473795", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "B7A39542-63F7-4946-9CF5-915CF7C9C73B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "66D6F5BD-5B9B-4359-B57E-CBDB8EDA4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "015E3A0E-EAEB-46AE-AD16-DA581DC7EB38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5F4BD01-07D3-4D9B-AA29-B65FABF79412", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1F2204A3-2DB4-4818-AE60-7A05DF4201F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B5F523B-DEBE-47F8-A779-A47E6F030AA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "6906C3CB-233E-40F9-9311-AAB858E75D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "057F1A40-3765-4D6E-960C-2379B666755A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3574C369-523E-4D21-BB89-BD0528AEE1C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1617D281-505F-49D2-AAAB-91D61F7D4797", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B1A43694-2354-4A90-9DC6-B64EF5C36C29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "AE407A80-914A-4F18-920C-DC4449661855", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1B7AF9EA-F37E-46E4-9201-65622BF927D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D00303-AFBB-4E69-BCB2-F009C3F32F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E22A6EA0-B1B4-405F-8F5F-A7A0731CC2B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "93DED733-C363-4552-9B9A-5A32E2495A47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "816C1DDB-1EA8-4C21-95F7-7FBEB439BC1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B52036E4-0F82-4BEA-A3F8-E573B1F5E261", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "28216EED-6ADC-4257-9A0C-4F6F9B5252CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A9202CA-7C4E-43A6-822C-0A78516685ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C9EAC47F-C2AC-40D3-9FB5-4779BAC8DFC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4D3CCAE6-AFAC-4E96-987B-A3D454D3AEB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "143EDE8E-C601-484F-BB6D-77BF1DA1EA3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3201B20D-224D-4598-BDC8-395299A092B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "336B7E0A-DD72-4109-BA72-C89D8580DECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "21D759E8-1C99-45EA-9EE1-F997707749AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "448588F0-0FF1-46E2-AAED-B78E827DAB6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C706AF7E-4443-44C8-A4C8-49A9116A1B71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3D1A0626-B7DE-433A-B1CD-0E4EE30BBD67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "9BCD174B-BB70-4EFE-802A-EF3651BF88D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5A0DE3F3-0308-4DEA-8E17-067DC5095B5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1785869A-DCD5-4579-B683-CCB9912CB038", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7EEA2E23-E8CD-4CE9-A430-BF9E63C8A708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "B90522AA-1221-4636-8DEE-E0A835888732", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "751DB1E8-D103-48BB-8593-8B242112177A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "61302893-7707-45A5-AAF5-423E9BE3BCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "020A9A37-0A44-403D-B814-3E9914802B8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A37D8D8C-3AEA-4D25-8669-F2261F3467BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8515538C-BCBD-4B49-850D-C523B475391B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "654A4858-B5A3-4A1A-80AF-29C7D4E303DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "6ADD6BEF-D247-4CC4-94B8-56CB9B2F71A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5E45D133-9610-4738-98EF-6737C7143B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "39711BEB-8D03-4E77-9DCA-2D77E8A8C39B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB7BC6E5-C674-4480-B214-0408F4B2ACC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "38F923E5-F686-41B8-957B-C02067AADB00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6DEBB754-62FB-4168-A0DD-6DA9CDF3E2A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "13C7E758-9BE9-4D43-B817-4916F34377C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8E2F613-707A-4B7B-A860-796FB817F7C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "2336ADAF-2A98-444B-9D8C-04B46F09F937", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "F869D906-6036-4523-852C-DA9366FB460C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "47642A46-A845-48A7-AF50-89893A2E6DA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "EDF7568A-2537-477B-8E50-293EF3D63C76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "D13F84C8-B683-43E4-BC42-3A3C8E8D9062", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "B1D74952-63E3-43BE-8D67-9B9F802A0F1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "970305F9-D100-46F7-ACBE-9EE2554B453E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "1B782873-CEEF-4E0E-BAE9-9B75E81D7C7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "B466BAF5-D17B-45ED-8590-3725B6E23C2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDEE36EC-D688-4794-B841-6BD6B65654B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "65026801-C2D7-4334-BF2C-4F43F1EA2691", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4CDCDCA-160D-4E1A-9219-66D26BBD709B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7675D1EC-EFB7-484D-9377-DC72057BE15C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "79DA5804-EE54-47FA-B667-FF2111C189F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "0A468B35-0037-4065-8A2B-561EAC7BF40D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E2460C9-F9C8-4436-BD8E-3FDD8978E8C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB0A8D86-9065-4295-8EAC-5E8B81AD9004", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6389261D-D505-4A9D-AE04-93E475A7F1EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "49C89210-100F-4051-8BD6-B29BD39208AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "397C3DE1-543B-4710-833C-B90BA658EE7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C40E8083-F373-4353-9CF3-7BC21DA13B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E4172D68-DE77-4AC6-B520-0D4D304B818B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "A05EA999-14AE-4D9B-B862-F5C2AD77AFF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3521AEFA-021D-4ED3-BD98-69EA7F7A9AAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1A89D9DB-422E-4B46-B36B-D99F22115298", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4B94E55-D449-41CD-B70C-E10D8A0BE467", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C4C953EF-BE1F-43DB-8DCC-418A74CB038C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7FB542E1-1285-4EF0-9498-399DFA0317C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "DAC38C51-E93E-45B8-B34D-8CC56BE4CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F55ADD4D-D313-42C0-80BB-50682335D71B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FEE660A7-9F0D-46F9-82DE-A945532D111D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "05EE4112-A613-4F34-B4CD-3A62837A7A4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4388AAB2-8FA3-43AF-8BA9-9E2E15EAFEF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F6585C4-6BE0-4118-9488-E8DB7BB60D59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "AA9BC2B7-F675-463D-8DFC-6DBAC5411E6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "BEE5A07E-4598-4262-9E1A-CB64AD3FC197", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "72663BA3-31B6-4CCF-86CE-DEE5DD7222EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "967C15FE-D2E4-4A8E-9A58-C49CD1ED8ADD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "31F3AD10-BFD8-4A79-9958-F15CDF276D90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "AE6E9A4F-30E2-4C3E-B7A0-71E2E0DD0F6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EF274EB-A692-4BD4-9A62-05A0C4F52A13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "98EA1F81-EAA8-426C-AFF5-C7F4DF09C497", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8F758DA-7DA9-4391-BFF4-0D79589163DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B33D39F3-52B4-47F6-A0D8-F74C37974C58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "91260A9A-CE11-4B53-9879-38EA90DA5076", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8820C456-233B-4FE2-965B-99D65C47D26A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "2C43C8F5-997D-4162-A821-18B043F736AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A215B29B-423A-4638-A703-7571B1AF2392", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "5C77944B-DC80-4117-A0FA-546E64D4E58D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED5CCDD6-1729-4271-8879-34E636390ECF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD5259DB-AAED-4567-AC1C-FA2C79B7B768", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9207F03D-5E19-4ACE-84AC-74241BA40163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF493E45-E42C-43A9-9173-2B8156D3AFC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2778D3E2-B0B7-4FAE-8D78-D1141F0E3541", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "600F33EA-837F-4D94-8B3F-1C1D0EA3FD84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "09F042D1-23AA-4BC6-A566-5825AEB67431", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "C48E84D0-A218-4321-8DAF-774A441BB246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "B067A3C0-FBEF-4A44-A273-0D05795673A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "9396CE51-CFEC-43B6-B166-BADE75A4095A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "81817316-E7C4-49C4-AA43-DE74431C026E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "89B9A781-9D50-4648-84BA-582B78DCFAF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "B4A54B59-EB12-4313-A5AE-EB8EAEB3B16E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FF585B6-1C38-4985-9082-604C5F34F366", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "ABCC15C0-8347-4770-8D85-4FD2F047B06B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A4952131-F1AD-4E1F-A723-78EAB40F3752", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "90E7DDD4-6FA3-483B-BFED-6BE988ADAC7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D8FAA968-ED05-4E30-A7C5-EC6DF95F6122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "807CA93F-F910-48AA-BC0A-DBC466319BA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "625FB1D4-2003-461E-B16D-AAA6ECDC13FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2404681B-34F2-4F60-AE8B-1A41E2FCFB68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "28644FCB-14E2-459F-B202-D1A30D75B458", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D91A5706-4650-44CB-AC10-B406B447F22B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74952D89-4C70-4EE6-84AB-638DFD3FA210", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD76DE11-83AF-4421-863E-E59BBFA8DC75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "92D70CDD-256B-4A69-867C-F0DC376E8C75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D1A475A9-63CF-414A-9D15-76E20A8F26A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "A9F4B111-1442-4615-8572-BA8CCD542C89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "17622241-C5B7-4C36-B5EF-F7BED9690554", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F04D29EB-7D9F-43A7-B1B0-0720ADCE91D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4401555-203E-4054-BD7E-087ABFA5DFF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1A45633C-C8EE-479B-9EF4-0E61E3A1AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B473CD27-8F47-4EF9-8081-F6F21F7F99E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "F65A1820-6266-4EA0-8252-FC7C764C19AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "27B505B8-B549-489C-8E72-DAA2D459A59D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C951EC7-F4DE-4826-BA1A-EFB9E8E96826", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5D19DA1-32AD-4710-B855-1C83147D2223", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "16E3DAD5-9FC5-48AC-AE89-1E55AD9C66F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "968B23AF-D68F-4108-8D25-A77A249C4163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5F4CF4B8-BB81-4D7E-95E5-9AD4073C79DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "FD006E30-1F23-4095-9DA2-CEB0FE3EC99E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4B0513F8-8988-4A24-ADE9-E8C64F6C3F75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1736B9CC-1CB7-4205-8B48-F45663939AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "24007238-4E08-460C-8B8C-4A18631F55DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "5B04CED8-C3F5-46CE-92EB-5837519C7D9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C70FFE35-56AE-4857-B236-6A0E68B02AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3E933BC6-3BA8-47FA-9E89-527B8B17A2B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "17A4F8A1-7467-4A67-B9E8-BDD3895BF5FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "914BAD6A-1812-47E4-8914-18F5A685D720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EA9EF-9BCB-41D0-B3AD-24DE0332AB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C7F5B8E9-EFC3-4800-9220-D5FBF76C2550", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "55D82C68-2623-4C01-87FB-7227568B5F40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "2BABF310-2128-417C-8271-247ABE2E593A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "43FCF398-B54C-4656-8D04-296F84F030D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "97B1A066-92EA-44B4-883A-3C56B3C97C09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0BEBDAB7-DE06-4443-A031-9DF42E34C64C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "79A8699A-19A3-4630-97F7-917ADBF7FC0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B582E338-B6DF-468C-BFA1-3166F807CBEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "713D318D-0425-4CAD-9FA8-AEA1F51BDBEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "91236300-8BE4-4446-841D-143C16F411B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "BB3BB9E5-A4CF-4F8E-9127-0226ACCBDA20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "3404A08C-9D39-4ACD-8FB2-1FC2CB60C8BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "077EE82E-802E-4682-9D41-ECB225663D73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "13C7DD49-6F7B-49C7-852B-B017A7B52D76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "FDC33780-7DA9-4F7B-B635-F033B843E8D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "B668FB11-F580-4BD1-ABE7-51D7BCA5DE47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "BF31E3A1-35ED-445A-9916-F1B3E28FEEB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8A4F0F9E-0B56-468E-A271-643610DEE893", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "B29030DF-30E6-4265-A21B-C77CFF8EB5DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "5362161A-8747-4D96-91B0-425632482D3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B45FB51D-D022-4B97-A2E3-B55913BE3226", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "200368E9-234C-4B43-ACD1-A38A6FAD6575", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6F97ECBC-D7FD-45E3-9090-22CABEB05D99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "24FC9D09-3F4F-4D70-B5E4-38E9A4FF2D58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "647817FF-CE4D-45CE-AA56-B9DD8C86C682", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A12ECEF7-849F-41A2-A3AE-38A0EEE96F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6F137111-6C89-46FE-9374-ECBEB04BC472", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "93FB92BE-C356-4B5E-ADB1-DA20EF08EE50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1030ACFB-AE46-4AEA-8D0E-BE25FDC1C438", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D1DFF30A-1CF2-48FD-9984-DBFDC4370254", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "52C5D473-4D03-420F-AA49-6434E71F616D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "4FBC4548-8003-415F-9C5E-EA16E6392159", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A87A5F4D-6926-4C91-AF37-E887779C3274", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "0E75B5D9-B25F-4E07-B970-AE0D1139F32D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4B75F71-7877-4FB5-98B2-6032451A88DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4E085AA1-13A7-43F1-8352-655DF2021EF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7F734E52-E3B7-4FE5-B358-C5B789BE1CE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "2DE7F863-0C4E-4ED7-B93E-A39B4F16DC9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "96396C62-783F-43E9-BA06-730F4F00745C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "605474B6-10E4-4C48-B054-A417FD10DFDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F94D18E2-3D7A-4E66-97CA-6929F5FFFE8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FD1BA948-F95B-41ED-9196-5AE30E65D431", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E548604-0020-4058-B092-09E4F7729FC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FF859776-422E-4599-96C8-9DA171518E8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "146D7A01-4D39-425B-AC25-7495F3272770", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1E390EE-F304-4CF7-AE51-5D4ABAC911E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB1076E-C71D-450B-BFD8-6D4C852F07A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E4783068-5CA3-4626-8B79-42C1A59E0C80", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "77D84605-E5BA-4327-8E19-AB289868B9C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "80D51C96-DD15-4582-9C92-E653836B4A2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "15864D11-8DC3-4617-9D72-5D71CEE8DB20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A0C0BDA-9E8A-400F-A6F5-67F9179F02FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0D278E3-DA6A-4515-A0B3-35B356563CA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3529FA09-3C21-403A-B5C8-713C205864B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E56C65A8-8DE1-4BA6-87C3-356815CD2EC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "587F7631-353D-42BA-9EB0-A27D6A795749", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "CC4833F6-E731-4541-84F6-82DCB598D127", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D38FC4A6-D6EC-406F-8880-BB2768ECA7EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "237B31F1-916F-4AE9-A4D8-14387C9E9CE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A62452F1-251A-47A0-91F2-47548CD7BB7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "03C0EB5F-2EDC-4E96-8A02-B216B51517AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AA355CA-9675-4967-A176-2CC9DC74A705", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "81AEF9FC-6C0D-40D2-9890-ED777411EAEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "06C04B9B-B2B6-4868-A6EB-363DA28BCCE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "9D52BAA6-69D6-433B-9C26-C2B34A08C9D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "C03C5A4D-144A-475D-9D4E-CCD8B87A8CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "CBC560DF-E884-4B54-AEF6-915C0893A2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "5ACD4A5B-58B6-4CFE-B321-CA8BB7EF65CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCC24D4-65B6-4508-B8D2-0FAB543D2EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "4AFB9065-1334-4054-BB9B-4B94612A5446", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "FA595BF5-454E-4F09-8B83-67E384544984", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "BAC5A086-1696-42B5-8899-72E34E6CE96A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "5DE071EE-5FA2-4261-BB0C-7B317943D361", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD458EAE-9029-4D37-A8E6-2D9ECE85206B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A732615C-B6EC-41E6-8070-0AB284BA2125", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "33D0FA2F-FC0F-4116-94A6-37DBF9A54D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "BB2BFF4C-5FCB-4A3F-9D5D-4840DF3255C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "502EA6A8-19B1-4757-A89E-6945FE1F52FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "454E4309-B6A8-4CDE-9588-A008254DB648", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A62C78EB-3972-48D3-934C-0DDDA8FC9393", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "923A60D7-1D9B-4703-8C91-3B79E14DE1A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B95CBF1-1A72-42D3-A62A-7CA538BB0A59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D297F66C-FAD4-477A-BA50-B04B1FA640CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "24E85FD1-6B26-42A9-8C99-46AEB8149B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "99F880A8-E961-431B-B835-B90721355427", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "63F18F7F-3F15-4096-90C3-EEF2E932D098", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FA004EC4-CF70-43E2-9F05-82E92C3747C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "710FD5C5-DEBB-40B5-B55F-DDD249D29092", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7A2B09CA-BEDF-42A8-B14B-BCF824E75A34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A5A46F79-18E0-46D1-94AE-D7B7DE216071", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE17B03-E880-4C5F-8A3E-ABC80A3D11D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "30225A07-6760-4F03-A4F2-8EC15344E798", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "26732716-1859-4D4B-AD20-946D3487C5E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C876CE14-1F0A-412A-B9DE-452309261D9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1FAE687-77F6-4471-AD60-5895D9AB29C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "180EB4C8-58A9-40AF-932A-2580642506A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "542BB3D3-E125-4F03-BFE8-24B1E527238B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E21F5092-5DBE-4BC4-BE48-68FC6CCF6AE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "373C21C3-52F9-4E9C-A18D-D0CD4986DEB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8AB19F61-0370-488E-A1C6-8DE1DF47081B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "EA36FC47-6E1C-4900-B7C1-5E96257BC2FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "01331225-F4F8-4FA6-8BCC-B5BF33B261C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "0E489CA6-DB2D-4D0B-90C1-4771C613CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "930F36A3-6E17-40F0-AC81-41EC362581B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "86121501-3B1C-43C5-BC3F-0A0101EF7A9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "42E16430-F503-49A5-993C-AA093ACBC5EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "45DC638D-3A11-4FCC-A835-63685B0F628C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "CB5214BB-B453-402E-8CF4-D92B533AC746", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "BB5BE1A0-C57B-478A-8A63-6542BD9558A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "7A9C7468-B4E3-40BB-B458-1C2C72B4F78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "98FBC870-7CFB-4992-8EBF-79A8DC05BA95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "1FB75DB3-1EC2-4E82-9DAB-B8DB766C1BA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A74C64B2-BD5E-4EAB-847A-BBAF0FB7ADAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "50716E58-B43C-4E11-9111-EF40D757FA04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "52CC028F-77D7-44AE-A58A-72E6675A2561", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B18E7BA-5963-4580-AA58-23A090DDFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C5D3434D-C82B-40D2-B685-DF2026312394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "7AF6E754-A760-4D1E-9D20-8996A67ACE9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B0F89233-4879-45EE-AAA0-73B61B95EFB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "646A4ADA-A768-43BF-B32A-89C45937F9EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "19BA8587-4941-43F2-A7C5-C5E67B6F8EEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "42900209-06A4-4C14-AD3D-E20003B806E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "381803EB-2C16-45B6-B325-04EF6D71B8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "CF8B1BAA-0448-4DB7-8F3A-31820E8D7204", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "2A3CEED3-A6C0-42E8-BB80-397D540F338F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "4FB5F6E3-C917-4CB9-AD11-AF1C83E4AE7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "B12E3E37-4846-426B-966E-D0D5314BBE54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "03310905-DC8C-4022-872B-4BD3670325E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4BF2F7-3A8B-4D05-A046-83B5BE49CF58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "21EB4192-F323-4D73-906D-7458E2624519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F4528173-2460-484C-9715-FB3D2E0D40D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EFFB1C8-E9E7-43E7-8B4E-1A77D0DC0660", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E719FD30-98C0-4582-8ED5-DDBA01CCC055", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "273DEB37-E03D-4DBD-A844-7BBDB2B94B2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E98B0BCA-9709-45C8-BCD7-0DE54200D7C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D12FBBE7-0EBB-464D-BB9D-C230B083ADA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A12A765E-75DA-457A-9F69-4148F75C8901", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "115F217F-4789-4AD1-A4AD-6F47F8AE45B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E6B25471-3ADF-4B38-829C-A642695F9211", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "B5D12805-D0FA-4E48-8ECB-4889EA1658A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "20F8F36E-7568-46C9-BADA-3ECA12ED296E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A214FBBD-D9BA-4C0B-8FD3-D63726FA56FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D6ECD3E1-F396-466E-BC3D-7A4F5D8DC702", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6C1C36C6-8D17-4925-BADE-39E005F6C4A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "80EA0F71-AF20-455D-AFCB-53B032501B9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "2F69B1D9-F7DB-4710-ACC9-07D2556A3BAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0246918-86B4-4D0D-8687-36BA3366E686", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6EAD975A-E783-4368-9CCD-F64C49C7FC3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DF318D11-EB66-43F9-BE80-0DBAEE0BE90E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7DBF1D-B441-467F-BB59-C8520FD1BF99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "544CFEF0-1A86-430D-AB6E-7457B75AD966", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "05E00EBB-F91A-4D06-92F9-C36A4C1B5424", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C84805CA-7599-4168-BCF6-B7261B3BC37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "71A956BD-4482-4920-9236-3FCD8ECA027B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "24634419-FF5E-4AED-876F-120F170BBC53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D55837E9-BFBA-415C-B145-AC5F5980A3B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "A7FB7281-7E82-4156-81EA-008037AB874C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC5D03DB-54B8-4141-979C-E9F922A5E30C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5466F8AC-4BE1-4F76-9D76-BA8FE04400E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "4803155A-26D2-45B6-BD0E-8A857F601570", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "98FBC25C-7EA4-41D8-824A-751BEDB6E5EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9463FC1E-01D1-4ED1-AE4D-F114EAC5579E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "6E58F866-8E0E-4C08-B0A2-3404CB2F2275", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "5ABC02B3-31D9-404A-87D1-59C3DB491B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "06AB7E8B-A117-4F14-A6E6-54B48CBAE76F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "A5431F25-B8C4-416D-A2E8-D6FFBCF99450", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8558C19-54C2-4B5F-9A83-2B6698228E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4D815E9-AC9E-4DE0-9F0A-0B656AC8F717", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "16C70EFA-78E2-4B6C-B9E2-1DBD10F1EC7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "92FF9C93-2BA8-44FB-8771-D6619A5968BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C83A4AF3-3488-49F0-AA5A-1935FD6D9D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9743A879-8C1E-47F5-AB19-ED12E7044712", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "67D5E4D8-0386-4442-9E1B-B17764F7C94D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "AD581282-F441-4059-8B7D-3E12158DEB11", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "88AB32C3-3C29-4BD0-8D76-6AB43DB19220", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "B0440050-1892-4494-9E4E-1501A1ADB95A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "11F2222F-1329-41DB-9CC9-BB81E6F190A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "6F1D4D8A-E838-4738-BC7B-F8E735292946", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "9B562136-4FA6-4D20-9F53-71CAE661A411", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "4445111B-E4DB-43C5-A2B0-558F49014A79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C512B1B-22FD-4C9D-A581-BEA74277E4BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "974E7AC6-6F79-4F11-84F8-3055688943A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D060674-CC94-4BAB-B450-4BB2CA37C44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "23E8DD89-80CF-441C-B284-E6643BCF59D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "1BF1C3A3-676F-4062-96CC-F62892E4C966", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F97850D-22C8-40A0-847F-1064C29A061F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B41E93DB-62E6-4AFB-8C72-44C51E1CB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C11A77A-9C5F-4900-8AA5-8A9508F281CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "0A76884B-AD10-44C6-921B-541FD2451E18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2262CE2C-5E6A-4E89-AC74-F769167FD356", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1613DD3-7F7F-4EFB-900F-D03F181994C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "596DD796-0B76-4A6D-9EE4-28A457A658E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "BDE8EF93-3BED-4AB2-8679-4AF6E036BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "0A765784-A1DB-408C-B975-A42838768304", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "25519F96-6BE2-480E-A39C-72715314FB2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "992DEC8F-60D0-45E3-83D3-20239100DD6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "420E3151-E2FB-4DB6-9889-71AD8ADBF39E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "EB414EAC-F82B-4394-9E26-7BDD18DFD8C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8B5CC383-FC28-4429-9A18-05B629C40965", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "62066473-2273-42E9-8113-9BD11F16A862", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C281F49-BAE3-419E-ADF4-753D2E33A26B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "27570DA1-5996-490B-B27F-C9B1151D414C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA24D52B-4448-4ECD-8DD0-96A56CCB76C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "BC0F0C44-9CB1-4A21-85AD-76FB1CE68407", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9160E1CE-C68A-4F3D-8F47-263A4591D9A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "857AE000-02DC-4D63-93A3-0DB8080E24F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8A42D9FF-BAEE-460E-9553-B7BAC5500A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EED815E6-E50C-41ED-908B-E1C215BD1214", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E03C4423-35C0-4634-806C-0E65529BAFA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "491413A5-7159-47A2-9949-47DD396E692D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "7BA99046-0F7E-4AC7-947F-33E600CF45D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5A106432-E284-46BB-A095-521120576F46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F7CF0959-F07F-4C94-8B7C-94FE9D786990", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "58EE070B-82E7-498C-8C70-419E8D4EA6B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A3E00EF-199B-4664-888F-6418F5069168", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A1474E0C-3C30-4B8B-98AB-094C3A7266C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "CDC0A211-36A5-4AE9-A308-E80901F04DC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "C7471753-87C9-41DC-B03A-0AA4EF7AB9EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D2A6C4F9-47BB-4F2C-8A33-5026078AC43C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "84000438-2E1C-4C75-AB44-EAE19B0399E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "257ADC95-65A3-4C37-8000-314476EEEE7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "59572CC1-3B37-488A-915A-305D7F334E59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3EB23636-3D53-4454-AEB3-C92E38AAFF88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DD38551-D3E9-4A2D-9E27-F279364CDF61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC82132B-093F-4D74-A591-D9279CAD7567", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "AF6EC4D1-C70F-4590-B7F3-346DCD764EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "179978C6-6651-4D0C-8777-422F03088302", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "3FF8C406-ABCE-4706-99BB-41BBC3707678", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "DF006C9A-D028-421A-B9E7-CF0B5C253ED4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "49AAD418-5E3B-4DBC-BC5E-E71202502646", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "E160D125-325B-412F-B803-E638526B4ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "27501C14-C68E-4FE2-BA44-7D8A0012014D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "AABA5D26-DE1D-43EB-97A9-93D38AEE20D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "48F52178-7F65-46C5-AF72-8BD9043E0449", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "C23B6B03-F0BA-40B8-BB5A-E20B2F29E2FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BCAB7271-16C7-4F26-A22A-55918A35C659", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "957FE027-80A6-49E6-9787-527D4C8FF9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "A6D2448A-357A-4422-AAE7-0871A7AB4181", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "695A147A-BB4F-4865-B846-DFC53850572F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD1B4620-5295-4094-B24E-5063B06ECCF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB5548D1-7E70-4E75-B0FC-FC390B858612", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A337A74-D00D-4B9A-BB0C-73EC7EB5D4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "85FEDFB1-0758-411C-87A8-4E16D9E30C3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2EC8E11-185C-4595-9860-69489CB8F6C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0E1F3A0-45AD-4AB6-BE5D-87BCA4DA8B94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "0DE2B0C3-C499-4450-92E7-D5EFEA3B820B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7FED0F38-1E71-4864-9555-30E5B081731F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "431702AA-2D53-46A3-B996-0E95CEBB9FC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3B616F4-C9D1-4FD0-80E9-20F62BB08B3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C350795-5886-4046-8BD0-98E6A8356803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF502337-A9AA-4539-87B9-F7406A637935", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9A4449B4-DF33-485B-A04C-DC2FED833493", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "59857C74-CB3F-4CA4-BF35-DBD2CF6EF78A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "9C3E4E69-3FAC-4F07-9DA9-1635FBC71AA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "287C208D-C606-4033-B72A-5A48ACAF436A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "07153746-2812-4CB8-87F4-6055A39AE576", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "14542A86-E097-4BB9-83C6-A796F77637FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D3FF0DC8-B988-48A4-BE6B-3A3A2CEFE746", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA62CEFF-81FB-43C3-B76B-21482D405B19", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "81319806-E32C-4C2A-9209-7416585D4949", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "4722F8E9-2104-4C53-9CA2-9923D5C7A095", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2C752AC5-BA0F-4DD5-ABBB-13D4DEA34441", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1B224B48-78EF-4986-BC60-1FB8CE4504CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "59F7BF1E-6189-45A4-9ED4-93D1CD85ADB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "DDD6135A-C652-4DA0-9858-860A73F64142", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B535AA17-0078-490C-9D1F-737C2DCC66CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D0D492D0-7D37-41FF-81C5-174A1BFCEA8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3069A54-9FEB-4F17-BE7F-3BAB2F59C9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "1264D36E-0C63-4083-9FB4-6040D0747261", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "246728B8-BD1E-4A38-9F2A-7489E3B460B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7D6781C6-F373-4FCC-A822-60BB9D2DC8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "14EA7D1C-DFCD-48E1-AC9A-D3E65EE4B034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8A060317-2E74-4785-8989-F3B5F5FC2E9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EA07AFBD-5389-455A-A563-8807370052B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "0720C38B-C237-444A-8FCB-6BAC4ED882FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CDC5E6B7-D763-4F4C-A312-3F128AE7AED1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9CFCBC58-6D45-4670-A25D-1CBEF2080A22", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "24574DE7-0B2F-492D-8006-922BDC017D0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3DFF32E-25A0-4A35-8B6A-9D9F7CDE09B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FFF5CC01-58C3-4B21-8633-5AC9ADBBAEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "F819B27A-AB6E-4A3F-8E67-E0C482F76741", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "44F74C30-EE86-4378-A185-E06D2FAF5FCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "55B6FCD3-CD5A-4FC3-B1AB-8248810F42C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "614A66E5-6ACB-4F2C-BF71-98DB797CD8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "288000CE-206E-4FF4-A452-71A861AD12ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "0E04C375-508D-47CE-B57D-702F3C6DEBC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "E1BE27DF-EC7C-466A-9BD0-0D0390E7BE48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3A508EA-D5B6-47F2-AB88-014BEDE6AF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "CCD72D46-978D-49B6-AB8B-A3205006906D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E425CF2-3C01-4EC3-9393-0BBC1EA7F8C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7221F310-42F0-4089-B394-A1F3430E83C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EE3A2228-3A4D-4E51-BE20-B926714C7242", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F7128712-603C-4D4E-869A-30859071A42E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F396B5AE-C7A2-44B9-8806-D252DD437CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5E2CDC1-4031-4F88-94C2-4AA7AC112D87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F150FAB-C2DF-4EC0-A21A-DDAB1504B1DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4AF0D227-65D3-452D-9EE0-2259B27A3F85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "037E7A72-A0C3-4FA5-B452-298891649517", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "11495335-F917-4C2F-9A8E-A4ECC21A6FF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "7C47AC39-7253-436A-9176-9971D000570C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B952EF24-B222-4175-A256-B57D409A1BC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "3E25A8B8-7FFC-4529-B410-49CA706C8888", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31B4AD9C-00C5-4CEB-9AC4-F4205C6630F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "86A0C561-5AD6-4183-892C-362FE8F4D5D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2197E7BD-827F-42FF-BB90-5AB4BB3B99F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9AAAD8C6-50FF-4EEE-91BB-3BD9861E804D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EFE78E3C-FB51-4369-95D5-31E429A819EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "3ACD45B8-5493-4B99-93E4-BBE571927C1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2DD752F6-6AC4-4D99-BE48-442E747CB86C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF13F6-A659-4E27-8350-7AF3EC9D6293", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "48E1C6ED-6581-4D23-BD40-641516ADFFAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "EB575C5F-69AA-4F55-91F8-3B11F6AA44D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "94CD7A2C-0D91-46E4-B546-A38B297698B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5E58B612-B8C7-4C0C-9683-73E994F55660", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "DF37494E-41E8-4D46-A210-2E4CDAE46DF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F58DC052-8846-4F1B-90CF-70E464103E64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1C3DA8C5-3CB1-4855-BE94-9F7DF1F61BC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "90C7FF2C-E0B6-44BB-8C1B-6AE032947E4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "699AC613-889B-4ED6-8BDE-34C3EE1ECCB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "99C6C613-7AD1-4BA7-9AE0-383AF0247281", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6892A82B-FA84-4A22-89E2-D24A20EBC252", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE8F3D4F-DDAE-46F9-AA99-80B5BDDC2B8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "DC86A4FB-6805-4E79-9389-4F52886D567E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:9.3\\(4\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "0F28FAD2-9C6A-4CA7-AA9D-EE5F7CC006B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:9.3\\(4\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B2CC4F2D-5E85-4EEC-9022-FE1B3DCB46AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:9.3\\(4\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "69E0BE44-A21A-41FF-AF39-4ADCCE1BC7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF4E54C-2DB6-4B46-A9E4-8C4FA8682F26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.1\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "83FCDD8A-AE81-4972-93D3-9DB98C2E5845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.1\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "0208DD6D-34D9-4BFD-B5E8-935C22269050", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CD91510F-1F89-4CFA-9040-25BD73F9F155", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.2\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F3C8077F-27D8-4A25-AFAE-9269EC436554", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "03586E46-C961-405E-AEC3-594EBA67CA5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4BD779B-AE36-4298-9B7F-7B47D0D5BF48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "7D8455E8-C2F0-4A64-AFE2-7122E874B9F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "2E1C24D4-BDFC-42F7-AC19-86376CFEB107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "C21E3419-7977-45C8-A33E-70B5E316F595", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "E43D205B-1C83-4AF4-A738-B36C00A61E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr4b:*:*:*:*:*:*:*", "matchCriteriaId": "0F51E412-0F60-4652-B02E-ECBCE95896C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr5:*:*:*:*:*:*:*", "matchCriteriaId": "F0272A45-0957-476C-AD22-5BB20F8032E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr6:*:*:*:*:*:*:*", "matchCriteriaId": "5B747A2E-D50F-49AD-99DB-5893C9B1D306", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)sr7:*:*:*:*:*:*:*", "matchCriteriaId": "6B3AF942-37C3-4618-89D3-B0F07267010E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "203E1BAD-8EA0-423A-89B5-FF67BBC158CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "463D282C-D71F-4F3E-8815-DAEA9A5A50DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "675932F3-FAC2-4F48-ADF2-6D00D7556835", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "442EAC14-C0C8-4527-9ECB-364B91C2BBBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.4\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D8C4DE70-9B58-4265-966D-34CAC9513D3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11-0-1msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "7C7ADE63-9BC5-4CB3-A950-04B36D8B945D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(0.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "041C27A0-28BF-4FD1-A2BE-D7BAC10B22C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "144FA4D4-61A7-454F-9373-F91548E4B8AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "008987E5-52E3-420F-A720-CF72E8D529AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DCB70B0F-32AF-4B94-8F25-AB846CDCC565", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "543FDB34-8311-4C3F-92E8-9D566898A2D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D24CE10-C431-4C5D-A479-728B612BB36C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DE48A72F-1FE7-4669-B1C1-97E11A4D6B84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3A26F9EE-8AAD-4C58-AC8C-5619F71B0F44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "1527D526-7813-47AC-9517-0AFFD62503D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "87056B9C-7AF7-49A0-8805-F113651A0971", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D9B80E4A-348E-4105-86C0-7A41C3E1566B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3459146-D6AC-4119-9DD6-39CA0F0F1FFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.5\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "31E80914-295B-4C28-9E7C-1FEAFE63F95C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.5\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "A914EDCA-4226-4D12-B346-D64E47261E88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.5\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "8FC1F994-A5B2-46AE-8065-4E7D474AE256", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4033FA79-84D2-47DD-843C-159EEE63A0BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.6\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3840AA2B-1018-41B1-9C0E-35A37BADFDB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B1599FE9-602F-4A0F-BA21-188AE6468E32", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.7\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FE7E7234-F62A-4271-BF08-48443007C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1147FF3B-0621-4E3C-B573-530F3915839F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.8\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6F23E592-8F2C-461C-AE0A-A8E25F0B6796", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.8\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3A9C777C-DA68-4E3F-AB3B-C68F580300E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:14.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "688F53A5-3516-40BD-8510-D21FB7C1B113", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:14.0\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "B3ADBFF5-3CDF-4270-839B-4F1EEAC59FBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:14.0\\(1\\)sr2:*:*:*:*:*:*:*", "matchCriteriaId": "0BBEB64E-AFDE-4916-81B8-26BE9FB74D13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:14.0\\(1\\)sr3:*:*:*:*:*:*:*", "matchCriteriaId": "9397C2D7-2793-4466-A02C-32A0767D88AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:14.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "01C78635-C08C-42B6-96D8-FD0D5DD9119B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:14.1\\(1\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F1906561-BE19-426B-9246-3589D6DDA1E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device.\r\n\r\nThis vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n de procesamiento de Cisco Discovery Protocol del firmware de los tel\u00e9fonos IP de las series 7800 y 8800 de Cisco podr\u00eda permitir que un atacante adyacente no autenticado provoque un desbordamiento de pila en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de los paquetes recibidos del Protocolo de descubrimiento de Cisco. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico manipulado del Cisco Discovery Protocol a un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante provocar un desbordamiento de la pila, lo que resultar\u00eda en una posible ejecuci\u00f3n remota de c\u00f3digo o una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS) en un dispositivo afectado." } ], "id": "CVE-2022-20968", "lastModified": "2024-11-21T06:43:56.270", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-12T09:15:12.613", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A99D021-C66D-4FA2-B33C-4DAADBB6B431", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el kernel en NetBSD versi\u00f3n 7.1. Un punto de acceso (AP) reenv\u00eda tramas EAPOL a otros clientes aunque el remitente a\u00fan no se haya autenticado con \u00e9xito en el AP. Esto podr\u00eda ser abusado en redes Wi-Fi proyectadas para lanzar ataques de denegaci\u00f3n de servicio contra clientes conectados y facilitar la explotaci\u00f3n de otras vulnerabilidades en clientes conectados" } ], "id": "CVE-2020-26139", "lastModified": "2024-11-21T05:19:20.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.647", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", "matchCriteriaId": "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0F9200-8AFD-4100-AF39-49476298C0E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "68C08ECE-4D09-4E57-920B-B8E94E81603A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F5154A83-2499-4756-9150-8BFD9ACEF583", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "7CC235C6-63B1-4085-B9AA-47EFB17A144D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", "matchCriteriaId": "54C41A49-87FA-4C98-8321-2808712B2F68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F8ED25D1-973F-481A-8550-16508F73D2D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "35918620-E4C5-4E46-A5A9-63009333667A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "27440732-54F0-40DF-9896-88D60ABC568A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", "matchCriteriaId": "FC39A276-532B-428A-83BA-141B626281A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "93103556-6C4A-4D35-91D1-5CDCDC740655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5DEFC044-1D95-4386-AABB-ADE1099E3F85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "42759A0F-70C6-41DB-9DF9-2BC05685F678", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "95662406-0D7D-45B2-95F5-582FA275AC89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "A0E9FB66-F577-4744-B51F-3BD25293109F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "079DA749-0B94-4CCF-A3B1-7669DA213B52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D96A05C3-1549-47DD-BADA-7872246EBDA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "2E7375AB-BE32-4879-BB54-CF5EDAB98188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0E9E26B8-1539-4E21-AEAA-45095F79382A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "19C73CA1-2F92-4635-8D38-812D6D8ACD89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "EA17907A-388A-42E7-ACC6-2F59C72C93F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "A53A71EB-C346-42CD-AD58-F83F809D0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "90E87633-CD6E-439B-9CE8-66A1E414F09D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "742D9262-4329-4F0A-B97E-5FC65786946F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "FC14C45F-FDFB-4AAC-94EC-45860051379F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "C01E79D8-5F48-4939-BFD6-B363A76769D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CEE50FA1-6616-402A-9D86-9725206612C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5B907930-CA5C-4160-A3D1-8ACB559C9143", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "9331282F-B426-40DC-869E-F6F7DFE959A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "C67D4B91-66EB-490E-B43D-A7E159CC543B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", "matchCriteriaId": "45A6A314-804B-47DC-B35E-804AD89588D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "968D60A4-036A-4792-BE8E-88F8B26444DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "754B93BA-0451-4C09-A124-284A62189D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", "matchCriteriaId": "85293635-DD43-4651-8605-4F27F228AA91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "826FB2F4-45B5-4360-B577-11F75A1B67A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F3417E19-D7FC-487D-B316-B826DB3CB712", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", "matchCriteriaId": "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "B66B6DB7-E48C-4758-915E-E4096CC5D68E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", "matchCriteriaId": "69C3A33C-85E1-4157-81F7-39FA271CF8ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "E65FB9EC-A750-44C9-B251-5D8697C29EC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7948D988-3ED9-49BE-B820-15728DA93D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B465A44-EC90-41C6-BD9B-59D3B7E49540", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", "matchCriteriaId": "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA329302-48FE-43FB-A15D-C3BEFB5AE868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", "matchCriteriaId": "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", "matchCriteriaId": "37055F7B-2F2A-4B80-AC34-CAB0568BC692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534CF2AE-2149-4599-AC43-13EE8048B3EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB15599-F795-4D24-A4A6-CD826F6A7A13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "441DF280-FC8C-481F-BDB9-7D757CF5BB72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA6EF369-8D83-4F5D-BDBE-99E89AD84810", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", "matchCriteriaId": "8191FD87-4E55-4F38-8DB0-7E6772AD075B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10BD5327-F3F8-4D0A-B6DC-2F11DF2E6866", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D717945-EE41-4D0F-86EF-90826EBE9C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "893D104F-6711-46F9-804C-4B57562166E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", "matchCriteriaId": "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4AABCC2-D2A5-4A89-9DF9-6F80EB871CC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D27AB201-342D-4517-9E05-6088598F4695", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw-6300-con-x-k9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90A743E4-1302-4DAB-9300-65D8F468C8F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED3625BC-9003-4E07-B4EA-EB44CADDD6B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el controlador ALFA de Windows 10 versi\u00f3n 6.1316.1209 para AWUS036H. Las implementaciones WEP, WPA, WPA2 y WPA3 aceptan tramas de texto plano en una red Wi-Fi protegida. Un adversario puede abusar de esto para inyectar tramas de datos arbitrarias independientes de la configuraci\u00f3n de la red" } ], "id": "CVE-2020-26140", "lastModified": "2024-11-21T05:19:20.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-07 21:29
Modified
2024-11-21 03:37
Severity ?
Summary
A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104445 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1041074 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104445 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041074 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware:9.9\\(9.99002.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D3D7A0C-A65C-4AA3-99A8-91142783802C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_9951:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B483E7-0B8D-480B-94B9-93F00AE91B4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_9971:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF7ABE8-03D3-4ACA-834A-89D37D5EBFB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware:9.9\\(9.99002.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D3D7A0C-A65C-4AA3-99A8-91142783802C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94B18568-30F5-40BF-96DB-589ED8D960F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BF164BA-91F9-434B-9837-1B6E600A91AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7912g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA43909C-9ED4-40B3-A179-48568BA5E4B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0D51724-CA7C-4F8E-9C02-408A96E32860", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7940g:-:*:*:*:*:*:*:*", "matchCriteriaId": "84AEFB6F-3534-478A-97FF-C100A86A269E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7519FF0-672E-430F-980D-53D2A851C78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:-:*:*:*:*:*:*:*", "matchCriteriaId": "37232BAF-C3BD-45A3-B54F-3DA2E15F2FBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5980E646-CA07-4222-A9DD-A71306A4A678", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7960g:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DFA9051-62CB-4C7B-9C97-CD901DC778F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1B979DC-52B4-497E-9D7C-3D8F861E6E26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8424EA40-BAEE-4503-A826-003C478D07F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF30D1CC-D27F-49FF-9C63-BB890002D1C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA879B6-04D6-402A-8F38-8A7CB34D76F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_firmware:9.4\\(2\\)sr3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DCC90CA-7D61-4B77-BA39-D343E2A65A59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_firmware:9.4\\(2\\)sr3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DCC90CA-7D61-4B77-BA39-D343E2A65A59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_firmware:9.4\\(2\\)sr4:*:*:*:*:*:*:*", "matchCriteriaId": "BDD6E0D0-6B8D-4C72-80F9-BF43EAD22CA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945." }, { "lang": "es", "value": "Una vulnerabilidad en el procesamiento de paquetes entrantes SIP (Session Initiation Protocol) del software Cisco Unified IP Phone podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la falta de mecanismos de control de flujo en el software. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de grandes vol\u00famenes de tr\u00e1fico SIP INVITE al dispositivo objetivo. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que un atacante provoque una interrupci\u00f3n de los servicios en el tel\u00e9fono IP objetivo. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945." } ], "id": "CVE-2018-0332", "lastModified": "2024-11-21T03:37:59.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-07T21:29:00.400", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104445" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041074" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-10 16:29
Modified
2024-11-21 03:38
Severity ?
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/106515 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106515 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ip_phone_8800_series_firmware | 12.5\(1\) | |
cisco | ip_phone_8811 | - | |
cisco | ip_phone_8841 | - | |
cisco | ip_phone_8845 | - | |
cisco | ip_phone_8851 | - | |
cisco | ip_phone_8861 | - | |
cisco | ip_phone_8865 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_series_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "98070A9A-E891-490E-9D20-65BB551DC9EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited." }, { "lang": "es", "value": "Una vulnerabilidad en el software Cisco IP Phone 8800 Series podr\u00eda permitir que un atacante remoto sin autenticar lleve a cabo un ataque de inyecci\u00f3n de scripts en un sistema afectado. La vulnerabilidad existe debido a que el software que se ejecuta en un dispositivo afectado no valida lo suficiente los datos proporcionados por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad convenciendo a un usuario de que haga clic sobre un enlace malicioso que se le proporciona o mediante la interfaz de un dispositivo afectado. Un exploit con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz de usuario o acceder a informaci\u00f3n sensible del sistema, lo que en circunstancias normales deber\u00eda estar prohibido." } ], "id": "CVE-2018-0461", "lastModified": "2024-11-21T03:38:16.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-10T16:29:00.287", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106515" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-06 19:15
Modified
2024-11-21 06:43
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "745C0AD1-4738-4A2B-B767-8C6D402907CE", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3914860E-9A39-48B4-AA57-B5870257278E", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27D37F4D-3B54-4387-9521-D226CBC22279", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "06C3D2BD-9EB3-4F9E-B060-38673B677E0C", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E1C6911-CE2A-42CE-ACFA-B98C79FBFD5A", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CBA15DB-CC71-4819-AF7C-88510535D5F8", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4F500A7-1C69-4333-8DE7-1FCC47292D86", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED2EC67-3904-493E-A08B-0B54D7599019", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4376CE72-90FE-4EE8-B950-B2D290E2E4EF", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "447A2AB2-175B-47E8-A65A-5F82D7A1C67B", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5624060-A2AE-4D80-BD6D-C08B3212BBC8", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8CE676-F371-4903-95F9-5309B1EDBCA0", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF0420D7-0F7C-4E8A-9634-116703A3EEBE", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "967AA76F-1F6D-40DB-9B07-4AE76FF68AB0", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C66C67B-22FD-419B-83EC-733C13659D36", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EA13ABB-5A46-41FC-910F-638C68AFF197", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECDBA5D-D5EB-43A3-B7C6-2C01DF40896E", "versionEndExcluding": "11.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los tel\u00e9fonos IP de las series 6800, 7800 y 8800 de Cisco con firmware multiplataforma podr\u00eda permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site request forgery (CSRF) contra un usuario de la interfaz basada en la web de un sistema afectado. Esta vulnerabilidad es debido a unas protecciones insuficientes de tipo CSRF para la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al persuadir a un usuario autenticado de la interfaz para que siga un enlace dise\u00f1ado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante llevar a cabo cambios de configuraci\u00f3n en el dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)" } ], "id": "CVE-2022-20774", "lastModified": "2024-11-21T06:43:31.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-06T19:15:08.377", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-21 20:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation for the Cisco IP Phone 7800 and 8800 Series could allow an unauthenticated, adjacent attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. Versions prior to 12.6(1)MN80 are affected.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/107104 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107104 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89D9BF57-C162-41AD-9A1F-E5FAEB6236E5", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1BBEA07-3154-4270-B865-D4AD26EB3B42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BD7E41E-0B06-4BE2-8261-DD3E6CC1ADF7", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF03D5F2-0483-409B-90F0-A1430774A258", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "206B3B82-6BE3-4A83-82AC-1B8833B3C6CF", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "220D7909-9F20-477A-936B-DF18481981DC", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "039A38D4-3002-4302-95B3-76F101C9E83C", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54A10DA5-A0BD-4E49-A08C-65163D51A912", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7FF8A4E-D04D-4763-852F-7BB48582B74D", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70632BDA-2393-4C38-94FA-40622AFBFB37", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8710D204-9591-4979-9EE9-0CC57A6B022E", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEDCA435-694F-45BD-BC3D-F6A4CD9514A2", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C9C9562-7698-4F77-8423-BE601C089DF1", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "569C0ABC-5507-4009-A1C0-C4A4E91B39A1", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B33943D1-224E-441D-A426-DABBAE047657", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1262C94-C8B0-4266-A369-6AA960F2FA78", "versionEndExcluding": "12.6\\(1\\)mn80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation for the Cisco IP Phone 7800 and 8800 Series could allow an unauthenticated, adjacent attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. Versions prior to 12.6(1)MN80 are affected." }, { "lang": "es", "value": "Una vulnerabilidad en la implementaci\u00f3n de Cisco Discovery Protocol o en Link Layer Discovery Protocol (LLDP) en Cisco IP Phone 7800 and 8800 Series podr\u00eda permitir que un atacante adyacente no autenticado provoque que un tel\u00e9fono afectado se recargue inesperadamente, lo que resulta en una condici\u00f3n temporal de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la falta de una validaci\u00f3n de longitud de determinados campos de cabeceras de paquetes Cisco Discovery Protocol o LLDP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un paquete Cisco Discovery Protocol o LLDP malicioso al tel\u00e9fono objetivo. Si se explota con \u00e9xito, podr\u00eda permitir que el atacante consiga que el tel\u00e9fono afectado se reinicie, provocando una denegaci\u00f3n de servicio (DoS) temporal. Todas las versiones anteriores a la 12.6(1)MN80 se ven afectadas." } ], "id": "CVE-2019-1684", "lastModified": "2024-11-21T04:37:05.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-21T20:29:00.337", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107104" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-26 05:15
Modified
2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "166FA402-36FC-4853-9667-FE2D823CB218", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A19E9296-28D5-4922-8522-C38B9D522240", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877D9E1B-453D-48FF-A28D-DFC936D296EE", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D92B14E-F15E-4FD1-9F2D-8B892554D6A2", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF9F28F9-D2BB-4CF9-A5BF-C25202C4282B", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EA36D63-F76C-47B1-B768-D9C00D4968BC", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBC3FE66-F02F-4220-AA16-47C9D42982D5", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A77BB6CB-C596-48B8-9638-B672C7179652", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7710A8E4-F4B6-457D-8CA2-58D0BEA42750", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BAF32A-C71B-453B-A49D-7A6EF37DA9EB", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "851FB717-E6D7-4048-A9C9-E89C63E0FDEF", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4976CA9B-8594-4DEA-B539-7EEF18BB74A6", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98DB6A45-AA2B-4F91-A838-7F2327222FA5", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C7BCAF1-D517-4D34-BE46-54A60A97BFBD", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD5C830C-2D92-4D90-9F79-3B39FC0DF987", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F81D33E-85E1-4C57-B4EF-F46BFC3163B7", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1B92B44-6799-4CF0-A8CD-9971E6B01EC7", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01BDA3DE-1262-4081-9C64-4E2DB1EF15CA", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B85A8BA-B2A0-4F9B-BD79-CDBDE29A0530", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", "value": "Una vulnerabilidad en la GUI basada en web de Cisco IP Phone Serie 6800, 7800 y 8800 con Multiplatform Firmware, podr\u00eda permitir a un atacante remoto autenticado llevar a cabo un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz basada en web de un sistema afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por parte del usuario mediante la GUI basada en web de un sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al persuadir a un usuario de la interfaz para que haga clic en un enlace dise\u00f1ado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "id": "CVE-2019-16008", "lastModified": "2024-11-21T04:29:55.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-26T05:15:14.130", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-06 19:15
Modified
2024-11-21 05:31
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_dect_210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC3C8D7D-A5B0-4771-9665-D0258312BB8D", "versionEndExcluding": "4.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_dect_210:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B6E163D-94B8-453B-8189-804A7C1DE8DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_dect_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B835D24-DA8B-4E9F-8731-8E53438CB912", "versionEndExcluding": "4.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_dect_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "4713CBC4-DC13-4D0E-83E6-34F4AAF07A58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BEAB12F-7C8B-4960-9161-89714A4DEF42", "versionEndExcluding": "11.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "366D15A9-2EBE-4CB9-A2DF-D5D575598744", "versionEndExcluding": "11.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7907FF6-F949-45FA-910C-FF111140594B", "versionEndExcluding": "11.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4709CCDB-04A6-4E63-A4E9-02904E44FA65", "versionEndExcluding": "11.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:9.3\\(4\\):servicerelease3:*:*:*:*:*:*", "matchCriteriaId": "5773D5CD-4D6E-468C-A07A-C8A707B11FF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "660475FD-8475-4968-9ED2-D83461B9A5D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_phone_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8831D2CE-55CD-4D5D-A9FB-3D9AC04DE5D1", "versionEndExcluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_phone:-:*:*:*:*:*:*:*", "matchCriteriaId": "060033D2-5332-4C89-813A-3780E1619DFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad TCP packet processing de Cisco IP Phones, podr\u00eda permitir a un atacante remoto no autenticado causar que el tel\u00e9fono dejara de responder a las llamadas entrantes, abandonara las llamadas conectadas o se recargara inesperadamente.\u0026#xa0;La vulnerabilidad es debido a una limitaci\u00f3n insuficiente de la tasa de paquetes de entrada TCP.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo una tasa alta y sostenida de tr\u00e1fico TCP dise\u00f1ado hacia el dispositivo apuntado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante afectar las operaciones del tel\u00e9fono o hacer que el tel\u00e9fono se recargue, dando lugar a una condici\u00f3n de denegaci\u00f3n de servicio (DoS)" } ], "id": "CVE-2020-3574", "lastModified": "2024-11-21T05:31:20.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-06T19:15:14.847", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-371" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-06 02:15
Modified
2024-11-21 04:37
Severity ?
5.3 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B0FADEF-5936-47C4-AE76-F9792EEB5FF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D7DE83F-249F-49CD-975C-776C880600C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "96DB28BD-AB6C-4BDB-B3EE-A2C09B6B522B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94058F1C-6BFD-4F04-ADEB-8A037DBD8A19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE866B51-B54D-42EB-A1AB-190C2F602774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17087453-578E-4E0E-8C70-D449B0EA92F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1A13225-DCFA-41D0-A1B4-9C5E5C0D96C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "28644FCB-14E2-459F-B202-D1A30D75B458", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4401555-203E-4054-BD7E-087ABFA5DFF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "273DEB37-E03D-4DBD-A844-7BBDB2B94B2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D6ECD3E1-F396-466E-BC3D-7A4F5D8DC702", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C11A77A-9C5F-4900-8AA5-8A9508F281CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "420E3151-E2FB-4DB6-9889-71AD8ADBF39E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A337A74-D00D-4B9A-BB0C-73EC7EB5D4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF502337-A9AA-4539-87B9-F7406A637935", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F150FAB-C2DF-4EC0-A21A-DDAB1504B1DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2197E7BD-827F-42FF-BB90-5AB4BB3B99F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "008987E5-52E3-420F-A720-CF72E8D529AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3459146-D6AC-4119-9DD6-39CA0F0F1FFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process." }, { "lang": "es", "value": "Una vulnerabilidad en el software SIP IP Phone de Cisco para IP Phone 7800 Series y 8800 Series de Cisco, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un tel\u00e9fono afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de paquetes de entrada de Session Initiation Protocol (SIP). Un atacante podr\u00eda explotar esta vulnerabilidad al modificar las respuestas SIP que se env\u00edan al tel\u00e9fono afectado durante el proceso de registro. Un ataque con \u00e9xito podr\u00eda permitir que el atacante cause que el tel\u00e9fono se reinicie y no complete el proceso de registro." } ], "id": "CVE-2019-1922", "lastModified": "2024-11-21T04:37:41.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-06T02:15:11.793", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-07 12:29
Modified
2024-11-21 03:37
Severity ?
Summary
A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securitytracker.com/id/1041073 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041073 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ip_phone_firmware | 11.1\(2\) | |
cisco | ip_phone_6841 | - | |
cisco | ip_phone_6851 | - | |
cisco | ip_phone_7811 | - | |
cisco | ip_phone_7821 | - | |
cisco | ip_phone_7841 | - | |
cisco | ip_phone_7861 | - | |
cisco | ip_phone_8811 | - | |
cisco | ip_phone_8841 | - | |
cisco | ip_phone_8845 | - | |
cisco | ip_phone_8851 | - | |
cisco | ip_phone_8861 | - | |
cisco | ip_phone_8865 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_firmware:11.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF1BC941-1489-4DF3-A92E-5624A0753B27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad de gesti\u00f3n de llamadas SIP (Session Initiation Protocol) de los tel\u00e9fonos Cisco IP Phone de las Series 6800, 7800 y 8800 con firmware multiplataforma podr\u00eda permitir que un atacante remoto sin autenticar haga que un tel\u00e9fono afectado se reinicie inesperadamente, provocando una denegaci\u00f3n de servicio (DoS) temporal en consecuencia. La vulnerabilidad existe debido a que el firmware de un tel\u00e9fono afectado gestiona incorrectamente los errores que podr\u00edan ocurrir cuando no se contesta a una llamada de tel\u00e9fono entrante. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una serie de paquetes SIP maliciosamente manipulados a un tel\u00e9fono afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el atacante consiga que el tel\u00e9fono afectado se reinicie, provocando una denegaci\u00f3n de servicio (DoS) temporal. Esta vulnerabilidad afecta a los tel\u00e9fonos Cisco IP Phone Serie 6800, 7800 y 8800 con firmware multiplataforma, si lo est\u00e1n ejecutando en versiones anteriores a la 11.1(2). Cisco Bug IDs: CSCvi24718." } ], "id": "CVE-2018-0316", "lastModified": "2024-11-21T03:37:57.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-07T12:29:00.480", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041073" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-15 20:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
References
Impacted products
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco IP Phones Web Server Remote Code Execution and Denial-of-Service Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "F84C7842-0D6A-4950-AC9B-63602140BAF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "144FA4D4-61A7-454F-9373-F91548E4B8AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "85C8430D-496C-44CA-AA95-6448F3459373", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "5800EBC5-4C54-46E9-B742-A49EE6D57A32", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB5548D1-7E70-4E75-B0FC-FC390B858612", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "07844DC0-2E7A-4540-897D-C4E2B440C4EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1617D281-505F-49D2-AAAB-91D61F7D4797", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B552853A-14E0-4339-A87E-7AE00BF143EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "8260121F-1819-40ED-A3CC-86A98B84CF13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2404681B-34F2-4F60-AE8B-1A41E2FCFB68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D7BDE345-B411-4A8B-A6A6-A031C52E2844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "D1350005-A1E5-4794-B853-9DB3494C3B78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5E2CDC1-4031-4F88-94C2-4AA7AC112D87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "228ADA90-87B0-4BBF-A7CB-ABDC2509E5A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "363E47B4-E22B-4A8A-92CD-1ACDB2CF6CD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B41E93DB-62E6-4AFB-8C72-44C51E1CB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "16218F2F-0889-437D-A8C4-EFC7C197C19A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E2460C9-F9C8-4436-BD8E-3FDD8978E8C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "B73D3CF0-E2A3-4A76-82D8-3C899B41BA11", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E719FD30-98C0-4582-8ED5-DDBA01CCC055", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "6528A512-7359-4F95-9BD4-0083524F9125", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D715BDD-D977-4581-BA09-A2936991CFA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "AA6858D1-20BC-417A-9328-196798A23B48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E4622EF-D5CA-4971-A3A7-0610C136F160", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "2740B39B-ADD1-4CD9-BEF8-FFBDEA1567F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "A3783AE8-6B80-4DC4-8525-84E63D50DAAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FFC9FAB0-B9A7-476A-AAF0-A4B14FC48CF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E6745422-3CE4-41A0-A87E-BD9C5DA45BF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE56B858-B59D-4197-9B2A-33A03908B967", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:8831_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "matchCriteriaId": "9F731586-5715-45FA-AB4D-7301D15DFB60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:8831_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "188DB874-2611-4919-A2E0-A955852AB424", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:8831_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DAD76AAB-7FD9-4F31-87C2-899128A1943E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE2514A1-486C-40F7-8746-56E2B973CBE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en el servidor web de Cisco IP Phones, podr\u00eda permitir a un atacante no autenticado remoto ejecutar c\u00f3digo con privilegios root o causar una recarga de un tel\u00e9fono IP afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a una falta de comprobaci\u00f3n de entrada apropiada de las peticiones HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP dise\u00f1ada al servidor web de un dispositivo apuntado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante ejecutar c\u00f3digo remotamente con privilegios root o causar una recarga de un tel\u00e9fono IP afectado, resultando en una condici\u00f3n DoS." } ], "id": "CVE-2020-3161", "lastModified": "2024-11-21T05:30:27.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-15T20:15:15.097", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-03 16:15
Modified
2024-11-21 07:40
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FB46C93-0E51-42F3-8F94-40042A5CBF46", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AD2F635-094B-4883-BF55-B85B16AD773F", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BA7B78-4934-404F-B4DF-6C936460E05E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "470A77FC-6DD6-44B8-B332-79844AE06BB2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CB8846B-6B42-49AF-BFC9-85CF89CA4E56", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F675EDC-3F39-4BDA-B6BD-2A0C1075D1D8", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D9466BE-960D-41DD-A137-ABE2C3F6D4B4", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27EA4CE-9BA5-42B8-B1CE-5710A6207CC2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4550A390-A8D8-4857-8C66-EC6B1F8E322E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D975C4C2-9567-4F5C-BE6A-137AE321F9F0", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD1967-D870-4E21-BF1C-D712809077EB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACB956C5-4165-4C00-BC5C-F4D4C6270070", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E1D601-371E-4F90-B6F7-8A6B91C949AB", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C4C70C3-D9D7-468C-B522-666EF6C01D20", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7609CA0-F9E8-47AB-A621-212DC124018E", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D936075-78C7-4E1E-A2B1-1EB8B668E3F2", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2691AABE-6E0A-422B-88B9-89E63D1436F3", "versionEndExcluding": "11.3.7sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory." } ], "id": "CVE-2023-20078", "lastModified": "2024-11-21T07:40:30.083", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-03T16:15:10.277", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", "matchCriteriaId": "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0F9200-8AFD-4100-AF39-49476298C0E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AED716A-D252-4FE8-ABE7-57D2AB3682ED", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "518B205F-78E7-48AD-A520-A799FCE11772", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12785A53-15D1-46F4-8F51-2DE8B91C5EEA", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C22FD7BD-450D-4F81-AD5A-4CFD898EC86A", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22306637-577A-48D0-840B-9BD36D116D6E", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49C36428-65A0-4CA9-A0D3-093547A5A713", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "676032C5-EE2F-4B58-BD5E-AA626E6B0C3D", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A55C08-73C3-42E7-86EE-A69DE10C2E8C", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "630DCA1A-4F22-4F17-9205-6BFB0276B98A", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A323D6A6-386D-4CBD-B447-2EB18339F6CC", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6560ADD7-3655-4A85-A24E-1A9CC132C6AD", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F285B53-44CE-4158-A773-99F799F6CBCB", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D645D23-2B8F-4AC4-89BA-E070F3292958", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E1419FD-D693-42A5-ABC1-0539FB8BAD67", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39D18FA7-E7D6-4F1C-BDE0-EB9526857BAD", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FE9C2A6-22E8-43A1-9936-EE65C0A342D3", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "092DA889-B167-41F3-81D7-B2F5BE7B99AF", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A563D688-3994-4A14-AAEA-A45525D4C380", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC333668-F713-4E20-97A6-A2192BF34964", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02148C0F-306F-4700-8657-45134F43E2C4", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C4F44A-8E87-403B-BAD9-E6D6557496CB", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BEF9B49-78E7-49C8-BADD-933EA12EA168", "versionEndExcluding": "27.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DE98041-599C-4B5E-9C52-234BA84E2731", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr18_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEF2C9C-2F99-49C9-95B8-93B0BDE5D777", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr18:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EC44D14-CF82-4C9A-A399-A3B7168F1F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A2E923-646F-4581-BE93-FBB3BD1A9814", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45A20191-7126-4B98-951F-2ACC03AAC227", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51590073-ACF5-42CC-9765-7DD358E03D40", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42F88F22-B587-44C9-A0A3-70EBDE310932", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "893DB2E2-505C-45A4-8CD0-A911DC6F8C39", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB69DA2F-0922-4FF4-B199-57F9C2E804B4", "versionEndExcluding": "26.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2274DBC-9BA6-4430-9E88-05027947FCBF", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56D2B98B-9080-4DD2-841F-664EDE48D843", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D7F4EB0-2C74-4045-B5A5-9D71A8BCC8C9", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7855CB23-DD12-499A-B684-3FB3C893A809", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47E66153-A0EE-49F7-B168-C953E390214E", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A69E5B-2C69-4769-94EE-02C70F270928", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85AD2B76-0B4E-434D-89F3-690E13B61B3B", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42B92043-5436-4CA1-A297-DE88A5631BDC", "versionEndExcluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A19DB2-1E3A-40AC-B265-878E9B568E8C", "versionEndExcluding": "11.0\\(6\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B261F994-59CA-45F1-ACAC-8F4E93C94C64", "versionEndExcluding": "11.3\\(5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:3pcc:*:*", "matchCriteriaId": "13D13E34-A8AA-46F4-A0E3-E79D4513EFFA", "versionEndExcluding": "11.3\\(5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:3pcc:*:*", "matchCriteriaId": "77FC1162-9241-4605-8E0A-F9AC7F5F94E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E3B94C-BA7B-481A-AF4D-2FCF5E81D7B6", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9A7F857-A3D7-43DA-8E94-FDA0EE542C39", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B9BC28D-0BC0-45CB-A87B-59F407F3A210", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_room_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F052EA74-DB34-4FF0-9A55-4E117CAF7765", "versionEndExcluding": "1.2\\(0\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_room_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "0872EA42-38A9-45A5-94A6-747FEEE0E1D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_desk_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A0DD3DA-5B3D-4435-990B-FF181130788B", "versionEndExcluding": "1.2\\(0\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_desk_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "14038A41-2C6F-4A1E-85A1-8692B9633C8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_board_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75ED1FFC-A550-4F59-B4AE-FE8B0261E1AE", "versionEndExcluding": "10.8.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_board_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBE3BDBD-4D85-4C2E-B02E-D7D71331AFC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_wireless_phone_860_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C80751CD-A4EE-45F5-83B3-E5D24C274B98", "versionEndExcluding": "1.4\\(0\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_wireless_phone_860:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC3CC529-4C57-4A21-8936-FD4222F2D350", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:webex_wireless_phone_840_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "336CF15F-5AD9-41FD-8606-1531F37FBE1E", "versionEndExcluding": "1.4\\(0\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:webex_wireless_phone_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "922CC404-372F-4F14-B820-67473C0938FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D5BDAE9A-9065-4CAE-8031-D294F31E2946", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "B6D89D68-199F-42E2-84D0-97D3FF59F05F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0E2D01D5-2DE9-4AD9-93D9-9C44F08B2BEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "21A17252-75C3-46B4-927A-124354169DC8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5721-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5A333C23-A56B-48F6-992E-3BF0BD93F730", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5721-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F941751F-76BB-4B0B-88B6-CFDBEA4FC2A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "867FE297-7913-43B1-AFF5-A4345FE7DF62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5721-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EB4AEAD7-F842-4E6E-9F44-73356C1874AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5722-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "840CD560-0324-41FB-B51E-77AEEEDC86BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5722-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "B9CFC662-6AA7-4528-B7DF-1ABF16DF0DAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5722-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2EB47ED3-1063-4A3F-B4BB-8671CE96E0B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5722-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "664E9B08-2FA7-4257-B4DA-E3BB510E1E7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5722-1fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "E7DCBC95-FEC1-40B3-A81D-179FC97EFEBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5722-1fc00-0ac0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "626DA25C-2DCA-4BFD-8A55-85BD1321D79F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EF32DD9B-2036-49AD-9547-956CAE3CD785", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "54DFFDC5-6BB7-4C97-B531-E6FD3CC7A533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "4B303C52-44D8-4AA6-87C7-2659F7C1610E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0aa6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "7F935667-D4C4-45BE-9D39-9B7A40BD80A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "FF6314D0-5604-4CD1-8C5F-134AC492483E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5F103B12-A8CD-4B32-BFE3-940E3B4E7317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5734-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "5B894E95-F49A-42ED-888D-4727F41F1A63", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5734-1fx00-0ab6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "6F7BFBE4-92CA-4D23-8136-605C83B7E66C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5738-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "F083F822-DDE4-4D14-81F0-4EFD60DB13CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5738-1gy00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "377B769F-0394-4E64-BF82-AAB8ADE562B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5738-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "8BB35C1E-C9E7-4803-9AC1-ADFCBCA1052E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5738-1gy00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "49160650-CDA3-4E4C-BE42-BB84EB19F7E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F6D3DD37-BAF7-4DBD-85D6-A6FEAE19DFFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "6E04CD9F-35B4-4E99-821F-D219980AE2CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "285EA838-3D9B-46EE-A9DB-9349500FC3D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "70DE2F72-4AB0-4D0C-AD1F-4D924CB6784C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "362FFD56-CFBF-4F66-974F-41FEE79D15AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1gd00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "C34A9FA4-119C-4B3A-BA67-B7305ED073A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5748-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D5CD5D61-1DF5-4B1B-8F9B-8786563BE8E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5748-1gd00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "8B7DAEE3-5390-4981-A577-991A42696AC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5761-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2E784308-225C-4FD1-87AF-A2D052CD87A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5761-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "62F306FD-D399-4D3B-9F4A-6605B035DFE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5761-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "792D3327-54FF-4DF1-826C-670C2B91DAC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5761-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "4BE9B963-6B95-49DC-A499-3DE4DC269036", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "7EED502F-EBE4-4DED-822E-8CA310A354B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "3C8D09C4-AB99-498A-BDA9-20F040BA57B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EEF16762-3BCD-4908-BDFC-EE1DC34023D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0aa6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "3DAC6CD0-C5D8-4C87-BC35-93E49FDFB55B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "ADAF404C-8334-4754-90B6-5C1E6CCD1F76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "AAF3FA1B-6774-4AC1-B040-BE5815859FD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "92E3C47A-CCF6-4B3B-9B08-5D03186C817D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fx00-0ab6:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "EC1F4E15-3C06-4133-8435-1A76ACD6EF62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "403F0AD8-E663-479C-A45B-352B257F0247", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fy00-0ta0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "21439D8A-680E-489E-A1E2-4C31B49E82BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5774-1fy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "DF180BB2-E8DD-4B9C-92C4-A8DD5EB83446", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5774-1fy00-0tb0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "A2C0E215-F905-4B16-9D80-81B440BA1F8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "9CD6B350-BA19-407D-9956-51D27A2E311C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0ta0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "EA5D4E3B-48CE-4C4A-A09E-FAEE74720091", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5778-1gy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "57ECC858-88F1-4456-B7ED-D3B1847F354C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5778-1gy00-0tb0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "5415EDBC-1FAB-486B-B874-B7D35860013F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "7CB72EAF-7D3E-4C4F-A72D-9D1D085EC32A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "889744B0-52CE-49BB-99BA-4B2B668DC3C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "3A12493B-2032-4F3A-A994-B502BF0EC814", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "774C7E40-0B01-4C1E-8EED-4E8A91B73E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "4E36CEFB-337C-4AD2-AAAC-43EF62E0E014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "1E4695C5-F117-42A2-B3A2-50D4777EBA53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0C284514-F681-4B9E-9A1F-D3F7BE9B5C0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "851ECBFD-AC30-46BD-82F9-267A11199D06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2F31CE93-B417-41B0-8060-3116347424A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2fc00-0ac0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "DF581904-415F-4D9E-9A86-5342DE2FD4D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2hc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F0306E3A-302F-4F70-8358-C13824F023E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2hc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "75A4F315-14FB-4E93-B74D-9E52682A6B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5786-2hc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "0E5EAC53-E32C-41DB-A2ED-F7DDA8F1B49A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5786-2hc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "BB7605ED-2ABB-4206-8ABC-3C1C1999DF17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "F640E706-6912-4675-A3D8-B98374CB3324", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "8808A2F3-ECDE-46D3-AD0F-02BE2735A6BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "2BB7F4C9-E24F-420B-9DCA-9E7994E05971", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "ADB85459-E2D7-4ED4-A0CB-17B68061E250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "EA798D9C-36A3-41C8-B9FC-8123EC9BF452", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1gd00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "64284790-C465-410F-B871-B0226725DDDF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "C7290D90-688D-4BE7-8089-095959EEC46E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-1gd00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "D5246D7B-63BF-48BC-A98D-5A0646FDE6DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "BC05A12F-5ADB-4AC4-BBA1-A319330340E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2fc00-0aa0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "54B39530-AE99-4BBA-8C59-FAC84DDEF33A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "34480D85-D445-41FF-B0FD-5D722A487F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2fc00-0ab0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "634ADAA3-8F4A-44A5-BC88-1ED3F1EE61C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "9474FF4F-F936-4E72-8482-5D1C9C49C890", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2fc00-0ac0:-:*:*:*:*:*:rj45:*", "matchCriteriaId": "317D4551-6400-4E4E-8AB4-9024E4BE72E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "73CB46CC-6647-4AAF-B3C8-042C776B8532", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0aa0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "0C9A1C83-A000-456A-A443-ECCC4A5900DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", "matchCriteriaId": "55B91BF8-1086-4721-8829-3D017341A25A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0ab0:-:*:*:*:*:*:m12:*", "matchCriteriaId": "ED8212AE-EC38-4F46-84FB-042AE480E53A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "B94BFF37-65A3-4F80-81F4-85647B4C2441", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0ta0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "9D9494C4-C03A-4B92-95B9-7D68FE604257", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "E4D701C5-F94E-4ECF-B0F2-477B7DF6630F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0tb0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "EFEFA2DE-F621-41FA-AB8A-9DF1F3762311", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:6gk5788-2gd00-0tc0_firmware:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "466CEF9A-C71A-41DC-AD74-21FBA163E97F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6gk5788-2gd00-0tc0:-:*:*:*:*:*:m12_ecc:*", "matchCriteriaId": "B69D6A0A-EC16-41F1-A1E6-38FADD9A190D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el controlador ALFA de Windows 10 versi\u00f3n 6.1316.1209 para AWUS036H. La implementaci\u00f3n de Wi-Fi no verifica la Comprobaci\u00f3n de Integridad del Mensaje (autenticidad) de las tramas TKIP fragmentadas. Un adversario puede abusar de esto para inyectar y posiblemente descifrar paquetes en redes WPA o WPA2 que admitan el protocolo de confidencialidad de datos TKIP" } ], "id": "CVE-2020-26141", "lastModified": "2024-11-21T05:19:20.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-11T20:15:08.727", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.fragattacks.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-16 22:15
Modified
2024-11-21 07:40
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:video_phone_8875_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC2C53C-D4B2-4DB3-81BC-BEA0AF14355F", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:video_phone_8875:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC9019DD-6941-42F3-8B66-1F3CDDDA86E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "DABEA69A-F808-4BFF-BA4B-98B2E6113F9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "5A6417B6-D3FC-4FDC-9248-F30B3F4A457F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C6D7010-E062-4A1C-8794-9D736FA21FFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEAEFE4B-1C61-4B7C-A164-1FAE945202CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "325F2401-7874-4827-8ABC-00791DD76AD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "565CBBAA-2CA6-4FD7-816A-CF422C57E259", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "128A056A-C104-4360-8065-7240F5FB368E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "207F4636-A228-4330-A8C1-82612EC5E242", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "E963CC90-A9BF-4717-985B-869FE77441C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD018C-E3F7-4EDF-AF35-1FE07F54CBAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "116B9C23-D5DF-43A2-9011-CEB5835A7907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "50E1EE42-3AD2-4A34-A2AC-1DB924A1FA23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "91681B9B-2458-4A29-86F6-007FBE4E34A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F190764-5225-457A-A129-3AAA68F7B314", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "78B8A7DD-6286-4C51-A94D-B591CA5B8DE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EA3D40B-3398-40CF-9C37-722100DEC923", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E2F3E220-6797-45F5-9A8D-010F24BCBF1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE7D4CFF-8CCE-45FF-9139-481DAF4A48CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "555FB9F8-C587-480B-B044-2037473C2FFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "EC4FAC48-4CB5-4EE4-978F-20E10AA854C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "CF301FF7-5447-4B49-82DC-F0408DE28F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6AA37B41-CB6D-49E0-8968-944916BE44EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DF1416F1-4E21-404E-A105-5B5C779633D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "7FA48285-A41A-4A19-9D9A-BCFF178A7B2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "38B73EE8-971C-47CF-817D-FDE2B3861499", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B35D198-8527-4414-989F-3A4EE601AFD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D62E3B9C-E3B3-4836-888D-97FE1F0EFCB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4788EED5-4067-4139-A700-142E4AABB2EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "4133BCB1-D7DD-4A6F-A8BA-E193E76CE98F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "82058653-1245-4BBB-B821-C0D56A02C54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C51B3E25-A2BE-458B-AEF6-23B5FE4A5785", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "E32AC898-7257-4EF8-95A4-25D439C02448", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "6E8BDCB9-4644-4B0C-89A7-13F20718B245", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "356954C9-0828-449D-B7C4-397F4CB4FBB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "06F05CAC-32C8-43D1-9514-A9D6BA9C4BCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "736BC586-41D0-4D71-93EE-953899AFA08F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7499E665-158B-47C4-B53E-98440EE2F444", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "40840FDD-E661-4663-8D60-3F8851A0748C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9083DE5F-C1B9-4D68-8A73-46D0F2B9A0A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "56729DAA-B823-480F-BB3E-10AF16A5871D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "5647C754-620C-4015-8A19-1EA66ECFCCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB6A92A5-8ADB-4382-AB45-0DEDE0561CB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "9577C5B7-AC80-417E-A366-F8DB68A69796", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "760B18B5-BEC9-4C69-BC20-28DAD37BD4E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9824121-49C7-46CC-B897-4DFAAE775CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0CB8C01E-1315-48F8-9842-74A563C32126", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "C263130C-904F-4769-8A11-F4873561B13C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6C0C169-F647-4BFE-B047-04D157FDD132", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAC3B1E6-EC7A-453C-B1BF-9E29C565B6FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "E2D404E3-EC6A-4CE0-8E6F-1000DE2656A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "F6664CAC-171E-4DD3-B373-D15DB450876D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "FFB8E2A8-9968-4E72-8E14-5F8EB8509E36", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C161FA77-40DA-4C96-A796-2B67A229A2BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "2CD91C45-D0AE-4B52-9E97-66517CEC5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "C1E8176E-1C34-4265-9A9C-2C3201A1F75F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "EE5A6FA8-8C64-4D64-A640-C3E964070D29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F8F3A48-073E-4A1D-B9DF-4B45FA993B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "B3ADDAE0-6E63-4F65-9C14-B4606BA33269", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F170D1B5-F5D4-412B-9194-1F96EB82AA54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "AF614C71-A854-456B-9C1F-29BFF6B14371", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1B88C00D-9577-4FF0-B55C-1891D738EC81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B9613F2A-3FE4-42C7-A110-DE23CBB9DFF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07D81AF-3DF8-4EE4-AE4E-FB875BE14BB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "FC2BE4E5-BCAF-46C9-8216-C7EB9BCD1345", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "8C30D57A-E458-4EB0-9C20-E336A586E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBADB540-9C35-4FD0-AF82-7980E1B2ADD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C077B45A-0B1E-4DA2-832A-1B201098C445", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "A36ADEF8-9844-4F0E-B2BE-D6A786B8A2A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A14EE59-AEB2-48B8-B08E-27FA1ED790D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "252AE700-69D2-4733-91F9-ADB3FEADC579", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "DE7EA9FF-CC6C-41FC-AFB0-4AB2B62759E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "0A38A681-F887-485B-8AD1-DB50C9F2D1B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB30CACF-FAE1-4A59-B0C3-8E0DC69EF0F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B781D8DA-0E90-440B-9286-C64E4E546224", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "E288B479-ECED-4F62-96E9-D321EBC55238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C71112F-F96C-4CC4-A8EC-385E67102B69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9673F09-8895-4360-8A2C-26EBCC4E007B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D6088BF-42A5-49A9-B0CA-EB359E302549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "E35416E6-38D7-4606-9C69-C22C0A15CC1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "47CDDBE6-D871-405A-91FF-8B1BCEAC0F3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "90C9277D-8BE4-4279-B41D-CE52920A5637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "41B7E367-F879-4C2A-B367-4ABB9CAEDC09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "A4665808-2B19-441B-906D-B45C5E2A01DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "AE8ECE13-617E-48B9-A1CE-F8E7A99FBFEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D822380-B514-4377-8481-33540C442950", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "97260119-5BB6-4098-AD24-D85B8DC150FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "5B8BFC6C-FC66-484B-9E6C-B524040090C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D0CB6DD-F460-4C12-81C9-4C2B2619A5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7AF1AF7B-6659-4634-B322-D41C2E612A3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "025A3CA4-32F8-492D-8201-B261E8B11953", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "40AD64D7-B604-4B85-9E5B-6FE2C5849502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC8254E1-EB56-4DA3-8F4E-8757B25B60EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A1445458-2520-49FF-B082-99D54A2B442B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "E67326C3-A1F9-4F2B-BF3F-48CB7A3F68D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "243CC805-613C-470E-B582-B34D606C0067", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "CC7486DE-BC09-43D3-BA2F-0DD3BA5EDA6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A93DB06-29F8-410E-8C36-B05B386AB644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE22B9-1DB4-4838-A0B9-DBCBCE3D11D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "CF247772-C2E6-4966-9DEA-8F52C579C6D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E845D7A-AB83-4D92-A7B6-EF5A3AEFB379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A413900-C751-42A3-864C-3BB9D0F24497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "7806B918-B0D6-4F28-A16B-42508F9A358E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "FF443808-FE52-4F40-8EE8-2FEB817E101B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "09F181EA-C7E2-4CFF-84AC-B1208FC315C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "65B1C3D9-6EFC-496D-A032-56867FEC87D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E21D9-F786-48C6-BBFC-A38037BE6509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEF35587-AB88-47CF-AC6E-A4357A00C7C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0D0AE34-5311-4014-8418-989829131707", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "12F86BCF-0776-4427-88B8-9CCBDD7C8C7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3DBBB40A-1D31-469A-9453-60B0D26FFE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "A821497C-51CF-4FA5-B305-F73967B98DF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "004E0452-C797-4514-A85B-570BE00F7D21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "6ECB6488-E463-4B2F-A042-77B1EA5F38F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "30CEA593-1AFE-42BD-B9EF-BCB884B76E39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "E990D32C-8488-4EEE-A528-FF0AB7A481EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B209B18E-14D0-498D-A440-90308CBDC532", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9328205-20BA-4E86-AD7D-E387F4D24643", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "410DB7FD-26CE-4CFB-9B0E-D72723EB7B15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AE675AA-9D98-46E0-8F28-6DB19E15A319", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E75BFD2B-9596-45A3-9FFA-95EA467A68DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "22AD1216-C14C-4900-ACAF-082FA588A2C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C3A630A1-0490-448E-A224-83F5F711A10A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E373BBB-28DD-4C6D-AF44-D8E1F03123A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "649A1967-61D3-460D-B69A-C04FF45C3B1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "8F368949-6CA0-4E08-88BE-4EE65FC426C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "E916637C-7951-4B97-8D09-8AD5819805D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "7472F127-BFF3-401A-957D-27A115768BBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFB5E611-1A60-4905-9D7C-0D0ACA16D00A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "207D658F-8EEE-4225-8B99-98A6D9097DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "120A1C31-0997-4E3B-9EB6-24545D54D282", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5B601-0F05-463E-A6AD-499CFE0D898C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF1790DF-DFE0-4542-A6B9-E6D7FDBF4B87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "4855D3B0-0A9F-4282-8F2C-BB8FFFB274F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "1BC3FCE3-A00B-431E-86CA-669BD878CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7731918E-CBE1-4A06-A5F4-E917AA6F4BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "D8654298-8F59-4C7E-8CE0-158362691746", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "E5E4EBF3-3DFC-44C6-A596-3F3CED7D6AA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECFB53DC-8F34-4380-A800-1CAB05459F4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C26AEE8D-64C9-4010-ABFB-6A624C4C85D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4FA7637-F229-4331-9E20-5261A715D5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "718B5D68-CAB7-46B3-92DB-F82EEAAD5AA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "023F69F8-B004-40CE-8CC5-B9DA48041D67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD479DBD-5567-4E2A-BA3E-88C54B36557E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "884DE708-ADEC-4C67-BABA-5589C498D6F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "FDE984CA-2356-4926-88EB-966A51A7E190", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "68A83E84-E46F-494A-B5DC-0AE5990F345B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5B79DE0-01EA-41DD-AE61-1954E21FB3D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "7183A8A5-E2F8-4B8B-9473-BDE00701504A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "6B2FC572-4BBE-49C2-8747-6B05D9D71611", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "54FD0FE5-7B58-4C72-8806-C7C12DD157E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "C627B8E5-7DD1-41FE-B100-B299EDEA9D04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "97787F93-231B-407D-B8B5-AD4D441A88B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "929BCBCC-FD70-4FCB-8464-DF4EA54C62DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "FC4542F5-CEF6-4315-8488-DC853F9F04EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "5B8B602B-F136-4188-BFAA-40F4F7009CB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "98E3BC9C-29EC-47AD-ABAF-61182DD3679C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "319155EB-2E83-4E3B-9344-CFE8F87FFFF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "CABCEB46-40BE-41AE-9309-7EDBB1864021", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "69A356A6-8DF1-451C-B340-D616917CB6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BA43F41-FEC3-4554-AA51-952C7495F76E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "C0586121-D5FA-487A-AC4A-A9FA7CB3D5A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5D4490F-BC70-42A6-992E-561E79BB4F88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "03A8BE52-45F9-45BF-BFD6-5D60ACDA44D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0D721451-E61F-4506-8074-879482CEC6C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "2E4F2BD7-4FAC-41F8-9F0D-7AA960DAB8DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C247537A-0143-4C84-B286-E504C3D597DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EE85AB6-5359-44BF-8135-0C1C3E112FE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "DA349972-CFD3-4D73-991F-D40EC0114DB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A8ECD88-DC55-41FA-9168-D4D18C5C95EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "294AB20C-68FE-4760-9426-679D35564B13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FC08E877-0E50-4F6C-AD10-00D404D05ED7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "E09BA73B-2F17-412F-8F13-0823B3E0F4CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "580BEE07-3842-4B93-A593-9EDA5654E97F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "08CCBCF8-34A5-438C-9D47-5430CE7B9231", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "5DB5F276-E28E-458C-B574-04B80B836257", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "E76A0966-0B20-4874-AAD4-F9882C4740AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "60D5E553-E050-4EEF-A937-EF823FF5C1B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA1FD438-0B82-4AE2-82F0-F66C10387114", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5265784-E97D-4DC2-83A2-3030BA269ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "8FC0DAA5-EA0D-44BC-B092-7D7B0DEAE300", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "77F4BF12-3267-4FF0-90EC-97A749BC5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "58F947BD-5B1F-424F-82D4-4FA0ECFED656", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "206107B9-A75E-4025-AD08-1C67A79BBCDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "A58A59BA-F531-41B9-BAFA-085EE678B6B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0F9FA370-9A6F-43FF-8F81-9FA1E20F570B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4DFB76AE-13DE-4A28-984D-48203A1CC943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B94AE3B1-D11D-4606-A90D-8794F1C08F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "DAC12C96-4052-47D4-B9C4-6F9E964D503C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "B41C0F3B-E3EA-44E3-8AC4-243518BF2E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CABDE7D0-114F-40BA-BE3D-2548321DCCE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "43E0AAD1-BE95-464A-A011-8DD8391B7635", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3CA4D75E-7788-4A82-81FC-B0DC74DDB387", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7D95B5F-2263-4990-BA8F-F8F42C10C436", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D8E15DD-CE4D-4D24-A840-5D39BF3DCA48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F61EA433-3B1D-4EAC-898F-F2BC392E5C54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "A134FEAB-59CA-407C-99F3-3B7BC5AE007E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "12AFDD04-CBEA-42FC-AC76-E7578E9D1AE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "265975A3-D905-430A-B37E-FFBF04320605", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "F2CD131A-AF4F-4993-A296-86FB96C5CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCB81153-7067-4894-8733-FF4942D5BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8601FEC0-0178-4B5B-930A-72E377A69107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD56D3CA-5825-4AF7-AAD0-C9AB832E3943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9CE69435-8F8C-43A2-B293-140A9F40167C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3F9C58A5-C9B9-4A18-A9E1-651ECACD68E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "49E0C17E-91DF-4AC5-92D3-4C306BE8F47B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "77594E0C-E791-4F73-BC6D-00106F7E8B5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "1E047EE7-5717-49D0-A517-8FE3E4D7BB77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B8F67-E5CD-4046-8AE4-9DA435967FEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6261EC02-0290-4CE1-8E7B-14449725136A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCEB42E3-B3CE-4FAF-9BC3-F4230A6A8082", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "BCD446B0-0B80-4E01-880E-91CB9E1D82D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE5C8D7-3BE3-4BAF-969D-054C3ACD88C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5E5C60C9-3B91-4C08-B204-FB276466FCBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CDF0AA53-FB70-4D1E-8239-ED6BEEBD92C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F780C93B-296B-47DC-ADAD-3964F559C036", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0D6CEB43-EF96-44D2-8E42-155955BFEF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FCC9A9AB-D2E8-4743-A1F4-D6E351412933", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "5EA2EF10-1A1E-4FB2-A00E-3570E53EF559", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "4A2D7396-22AB-4E8D-817A-76AA1D8ED48C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "9AA4B443-32F2-483B-969D-9A90DEF37406", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "06A810B6-0650-48CC-89F3-6F732420D93A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "31CCCD48-AF6A-466D-87E1-266820123DA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F712E-A1EF-479E-BD1C-9F35C37F9526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BFC4715-CC63-4827-AEC7-2440A641C6CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D3412CB-A737-4FC5-9C54-8DF5586C719A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EF303D3-879D-430B-9D90-DAA79C3FC78A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "F164260A-63DE-4DAD-8DFD-3396ED3D7949", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A0A2B00-68AE-4A78-AA00-11E6A1F12A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "86B3695D-2613-4E92-BA29-3E341CF2DE7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "A91DFD5B-FEAB-4894-8799-A755CE06BCFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BC16B50-50C5-4868-BFD9-F0BB3D3C91CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8CA3369-438C-4FCE-8766-CE9540383934", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "048E8797-DAC8-41D8-985F-FE5A83A8A961", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3F8DC25D-67FE-40AE-BA38-A0FA3FA9A503", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "578F74E7-8234-42EF-8211-C3857227EDBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D603C7E-E740-45DB-999F-83D25F51A8FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "4A9F3F64-E30E-4BBC-862B-427D8D465624", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B24EA7FE-E7C0-47BE-B02D-7E8B840D14A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "53CDF5E7-E5F2-4EC6-B4D5-513905B87CBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4D6CBEF6-000D-409A-A4E9-6D650AA5257C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F74C833-16ED-4E26-BDAC-8B5DBCD0055A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5429B-BEC9-44D7-BF72-028B5272FB4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "45E16BCC-A22C-43FA-AA82-19BB8F0AE16C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E94B4F8-2D71-4C67-AE1F-42D9B441F55E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "297DD17F-C172-4681-A7D0-B73C73036C44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "71AB1DB1-B2D4-4ED2-B070-6C1DB03AB88C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "A9048DAF-D539-4187-975E-64C7461FEC75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1BDA1C93-1D77-4EA5-9ECB-DA6FEB6BA6E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "F46C1053-BE8B-4117-A084-7AC8940F359D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "D3DA7CE7-C894-41C6-BB20-FF6C4179EADE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "73490566-91DE-4B31-A159-D24D7ACF2973", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C19765-7AC9-49E9-9057-85895D22F827", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "15782A3F-1D76-440E-99C5-BB992E473A66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "451B569C-0670-44D4-8C6F-3361755B0EF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "DCE3C285-8584-45D9-83A6-525D6D8B3073", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF5F8B2B-1EB3-4C27-9485-3562B66A85F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "16CD80E9-D861-4E16-A194-875E4B9507A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "68DB276A-4B6E-47F8-9030-5D740F6E0766", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4363B65A-9D50-4353-B8B8-ECF2CC1618B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "4782D308-FF62-4ECD-B8B0-FD13CFA241A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "701C3763-F0FA-412D-9908-73B1DBE07794", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2912370-6F61-4BC6-B939-CF6616997C58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "678E05C2-7BB7-4EF4-B3D5-90BCEA2E32DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E15F943A-3492-4480-9AF3-1ED4E9BCC7C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "12DF1455-6F97-4DD0-92FA-31F13C7E5B27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0EAC1711-74B9-415C-A530-2400F22F0701", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "11A4A14C-2AD8-4B5B-8E86-C59246B360F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "950A77AB-4CB1-4255-8832-3F6D7D220AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B80DBBBB-7DCA-4032-899D-FCEB3DC4FBF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "9CC528E3-FC10-4364-85AC-A4168A6AA2BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABC10F2B-1965-4826-A82F-2A46C04511C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D824A2EE-D0FC-432B-AB48-F6A4756897DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "6AB3729C-3B70-4D29-A0BA-8EF856307688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C6F8384E-A69C-4B42-AF15-A3B69067A150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E11E46B2-9D47-4178-B0A4-C9B8B2AEFF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "418D5591-6D9B-49DF-80D5-4B9BD8D63619", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "D8D53052-659C-439A-B857-AC773378F6B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "319D55B7-75AF-4F7C-9CBD-CE3CCC426E46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "1B6D6353-733E-46A0-B68D-E023BE05F85F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D30380D4-3A23-4788-A970-43E4D2E6E8A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "F03DD6CC-F7E9-4F85-8B59-FF29AC39143F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "5323790B-7D01-43C2-9F2E-0EA461696E2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "711D5019-EB05-4DAF-BF72-36E17206685A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EA81344-8D42-4226-A572-B0A90F564618", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "8ED50204-80C3-4F38-9713-DEB8B0CBE112", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1564453-362A-475C-811E-65CA3907D568", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E242292E-6874-4CFD-A573-AC3EDFB45746", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "A44D6295-256B-4503-8707-83E6B681C24F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "07047B9E-2F94-4518-BBEC-86E6AC51ADC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "920B9D68-4CC1-4980-9A3C-07C6C90C2011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6DE550A4-9412-4ADC-BA6F-950AD4F72B4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "37664783-263B-4EA8-AD01-67B96BFFF553", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF17F64F-F378-4B4A-9C8E-AC44BE0B05F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1FFE9D23-4798-42BE-8D85-8ABE65C862DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CEE12502-8DB9-4C1A-8BF2-2AA2877A5BDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "2D6E6DB5-F415-402E-A296-C49FCF33883D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2809B892-17B1-4A0A-9E15-1725A8E6997D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C2EB1C5-2D36-4A6D-8F92-223F46CBD056", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "23C6474E-4F9D-48ED-A03F-DB087BAE0B64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "1C294B37-610D-4B5C-8ABB-F90129B7BE70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "EA3F04CF-F9CB-4830-ACEF-FFDA432C627F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C81514B-DA75-4906-A70A-543645975B24", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0B4EE2EF-AEBE-4B44-830C-C6C104782152", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "634D85D7-CA54-4121-8109-E8EDC35A41EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "E43CE640-9139-4910-845F-D61B03E3BCB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "90F0B54D-EA6C-4137-A344-7B85CA3E0A83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "0272102B-CC8F-4519-A199-8FCC4BEEE9E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "549F3BBF-2DB0-4C74-9A9F-6FB5382E5189", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "912231AA-C393-4975-8989-652F5F793685", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "82249A4D-4640-4D25-A69A-F5F2612665F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "56425029-060F-4220-8716-417B8D8F9845", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "5F449238-0BD2-422D-AFA6-9443E6C4A8C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "3CEE1353-D87B-4CD3-AFD4-82BC5423D91B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F889562-3DD3-443A-8590-50BF86AA4F76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "69DDB246-F153-45AD-BE18-AF7636774D05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "02F84C06-CE22-4F0C-B808-FB04BCCA54C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC501BB9-D464-4955-B70E-0B2A7A33C9BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "25558840-42E0-466C-B7CB-A7B9B20B15EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "10942B52-81ED-46F8-A2BD-2BD37A9117BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "ED4FA6BD-B1C0-453E-BDAE-735CD915A2A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8826F8C0-2056-4144-993E-96517F83B9CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "059EC856-BA67-437C-BE1A-0F161C402EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB4FB0F0-08E0-4017-9EDD-04D85A3C9544", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1409B505-E7EB-4FCB-825D-68FCA2A33579", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA7AEF19-A419-42A8-916B-62A09F3FB16E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "91D3F598-B3B3-4B6C-8EFD-2F8B71386A79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "DBCBE62D-1BDD-48EC-9BD5-ABE505C21668", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "80191538-8561-4A6B-8E61-12C7C0E56A79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C4B2C94-562D-4095-9C30-D0607AB73274", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "5A9D1167-C959-4BE9-BC3A-6F5B2B02D0B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "AB6ECC98-63F7-44D7-B1F1-A5BAF06C765B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "1DB291B1-D3AF-4847-B1C3-42C393B5144E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4620A953-1FBA-4493-99C8-D7EA33684677", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BCA71C3-A320-4AC3-A076-573B3E76217B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "45F69715-462F-46E6-A43D-78E55E85D49C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4A0E4A4-491A-41CA-9AA9-A250F9FD5928", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "60420060-F3E9-4267-8298-AD27F83753DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "3165D2DB-0D52-4CE0-B068-2FC29C2D910E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "545E3FBA-A50F-4464-9522-2A122F6024E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F2C175B-8477-455D-A3F4-F1BBA93ED1E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "2DE7287B-ABED-4F89-99C9-B379A8B3AFC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "63044AC4-E62D-441E-BCFE-16BD2BF958E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "925B4CDD-D482-442E-A092-0593F7E8BC86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "05335BA3-C452-42A5-8494-1A0815F94003", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8032D5B8-8A2F-42F0-BA5B-389297AD1BD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "927B3871-9E88-4C1A-A0E8-035AB5114FB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0350E26B-3410-46CB-9FA5-D97BE4453A06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "199F9108-3831-4E6D-8163-F9E91DED3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EAA02306-07BA-45C3-9390-7F2595C1A44B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6E98AF51-57CC-4613-BC16-039602548F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "6C57350A-E295-4140-B67F-B9CDA6BC5C03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9CFF0D9B-A151-45A8-8410-F242FCA0F776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "95146F05-4807-414F-A650-09751DF44770", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "284DFB55-8FAD-4586-B91C-68C94B2689A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F1EC232-6DF6-467A-8264-249899B93692", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D39942C-A7A6-45FA-AAD9-5373DBBC2713", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B22FA4A8-D59F-4E5E-A7F1-73AA9D15326F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "992CAE24-643E-4CD1-A2CA-44664C1DCDCF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7CE092C1-6DE4-4C0A-9120-3E67A48878B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D3CA5CA-069B-4A09-9118-9ABE3D06AF5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "D715A726-527F-4ABC-BBA3-116E6B0DC65F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "15CD8AFF-4ADD-4105-B719-604A2050C4D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "DA097C40-F063-409A-B355-4721EAD12DA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C62E6970-DEF3-4A8E-BDB1-3A297C42736D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A05054E-1743-46B0-BA2A-50E0DF42544A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "783F63E0-3BB0-4770-AB01-A4A1127A4FBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B11A2C76-28EB-405F-9C03-B71C92C3ED23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "667C9C62-4E06-4420-A04C-0566D18FD0F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "528FDCE1-E110-46BA-82C5-BF9F92CBF3B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "93CCEA69-D71F-4620-A59D-96DE286EDA78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "05BCA2FB-FE1F-427A-983D-EAE585BF7C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "9F5E95D0-E4EA-4E8D-ADF7-B8E3654E3AD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8831_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "D7986EA2-5C2D-44F7-99F7-2F3EE0F1557D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D931AB-034B-4061-9156-039010ECB648", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "44840ADC-C771-411D-BC4B-4D885F483C73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "75A0A159-1F94-4767-9BFC-43CDF9FB5213", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C41A449C-F8B7-461C-B7DA-9A240C157A07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEF4B3AF-D0E8-42D8-8586-742C870D371C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "71DAB4BC-C020-4C03-891A-D7450B786598", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "31D3046B-8C6C-44FB-A231-AEEA9168B54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "603B3EB7-5E27-4E65-87A1-91E94AE088B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "4743476E-B76F-4AC5-A5AF-4E49B2D3C2E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3460D6-D43E-436F-B01A-FFDFABB46830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9ECBE27D-A7FB-4F3B-A19E-3DA2D99BEF34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7CFD51-3F85-44AE-888C-4F8372E45D9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "F18B906D-F88D-42F7-8BA1-145EDB2401AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B2F3CAC-10F6-4D64-90C9-E46DD672F2AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "350D9A32-911E-49E6-915E-9210A5560150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F58F39B0-E8E3-4AE0-960F-C6C28D92C505", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3783B1-AFAD-46C8-939E-53AD6234AFAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9325345E-8FB3-4360-83BB-FEFA2904DD3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FA9B687-BE83-4597-AC7E-A2E0FE705415", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "5AE24180-48E8-4B95-B6E8-EF3C900D87D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B0CB76DA-9077-4D6B-B555-60F695511743", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "3B9BAB23-FAF3-47F9-952D-207211A7C115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "70F8D873-703A-43C9-9EFE-CA57A795046B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C772D6D9-F6B4-4A32-B49E-F2C10404A384", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "05645278-6903-4C42-B1F4-116615976113", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "01E1B2D4-06E2-4584-BF76-7F6FAA21F06D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "0218B816-6FA1-4BE0-BC6E-277C17A5DB67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E5726EB4-B1B6-4DF9-9263-D8B5742CEBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E345118F-4326-4A07-BF68-E59407589AF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "E4087699-0424-4C5B-83F9-399E2781381A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "60C056BA-9EF4-4D89-A7EE-96A8A0592266", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B25E6A71-08F9-477C-B313-235CE19935D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "F1B4FFE4-C7E2-4224-81AA-CE310D6F5B30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "2CF5AFA3-DA14-41A9-8969-EC08578A7B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0477E171-F551-4C6D-ACDD-9F73F236A26C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "051C4B11-1134-4593-9C06-A4F7F2086D31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0066BE4B-A511-4BC6-8208-B9C102C1D3DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9B3DE1C-20A0-4FC2-8E9B-19FEB6170BF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "664E161A-1639-46D0-B624-E82B94F6F3AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "649BEEA8-7C75-4D54-B9F7-B7109C491CED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "2293C16C-4253-47DC-8B34-BCB6D5345D69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D6BDAEE-9392-4572-A3B6-289B7C7E8DD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F6187843-9D97-49FA-A324-98A826427160", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "D0A87A43-8FD6-41A4-8401-4436CCA82509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "97330FB4-0A61-44EB-A4E2-44CE8A0BE152", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "572569A3-2B98-4C99-B881-536E5BCAA92E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D41E9AE-DE06-4C37-BB2B-63D324E1E19B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "105A04F5-8225-497B-BA54-9C833348B2C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "16FCCD31-EC94-48B7-B891-6C9B6A4D3E59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEA972AB-B368-4D07-AFDD-0BEC951FD759", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "11D76A00-20A1-4EF6-8250-A65EE320102D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "6A81EE63-1E69-4361-8196-8360B7CC4AB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "919074CD-DEB5-45BC-9069-FC38934FD3A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9D6A89A-AC97-4261-8A9D-AA629927078A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B6D6D-5AD3-4D42-99D0-77CFA898B01A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C8D6DF2-DBE3-4D46-A047-54AFDAB0F6F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E5E4DDA-E4C8-4161-A3D9-CB1473FAA918", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "AD8D45B2-5FB0-42FB-9724-B8F036D3EA56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A4ADDCF0-6D19-45B0-9C5F-DE8D6D210F02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "73DA8441-972F-48D9-8155-0532438B7504", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "8AF826B4-1829-423D-AB48-9A19B0F2F304", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "325EB932-6054-4B55-BA14-8A704E26BA6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8800_key_expansion_module_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "271A5A6C-B5CC-447D-AF06-64592BA186F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8800_key_expansion_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CDF3D2A-D68A-4B0B-B16F-9B137FE2E1C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "AC9BAFC5-C637-4E1F-A2FC-73EDD24708F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "1AC2AF6D-8C20-43C9-ABC1-A1B33B2DDD6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F038B43-4F5D-4A5F-9C4E-7F0DFABB7AA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10D0168D-2E5D-4EC3-9026-E2B00DC2057C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B68874B5-4985-4A55-A49E-E73C53B3CB73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "340E76AE-9AF2-4AE4-945C-BBD6FEA0C4C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "723573C1-35C3-43CC-8FE6-01B8686192D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "619BD39F-10FC-43D1-A862-456586C3A430", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "F045224E-23BC-46BF-91BB-E12B286E3334", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "674AACDC-48EE-4A29-8871-952D508F9F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B929BC34-3B5B-445F-9C95-B84E65490CF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "9566B3B3-3B42-4750-9B2A-4F84D918982E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFD4BC35-E46F-4E87-8710-5807D8923394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "489726C9-307A-49E0-9B9F-A26A9D3BA5E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A98DA9-E72D-4F15-B008-C1A40518D83B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B8FFDF6D-DB3E-44FF-8C9B-0D8548AE8804", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "80E92704-41D9-4802-BEF2-607DD2635854", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F02588C-C56D-4951-9949-CE62A151A5F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "BB74D839-CFB2-4D28-8445-0151C6B14D03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "B019D8C7-6B34-4A15-86BE-260B80EC89A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "69C612BF-029B-4873-AE41-C107309D189D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DB08A151-98D4-42F8-B14B-E0C2847EBD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0760E92B-16B7-4177-BD1F-5A22EA1CFDDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "715B53F0-099D-45C0-ABF3-91028C2AEA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "436BC808-6B54-4387-9575-42F80E2A925A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4BC1BAB7-9825-4A91-9441-EC13D55DB648", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "DB25358B-589D-43DD-A20A-9C4193140A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "31FB0596-C9E0-42D5-AB6D-B8B82A1EEE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "88058E00-C3D9-464E-A226-3B97BBCF9E62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "8E87B6F7-0753-40F9-8E2B-858D626B3E06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "511B3B6E-528A-4D84-B0DA-13EEF484CC4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "3C296AAB-FC65-46D8-94D4-BB728C419FE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "B778707D-02EE-4FC1-8406-CA79039A602D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DCB1EF2-67A1-4159-8FC5-8A155061CEE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E67F17E2-B5CD-40D5-BDB6-122AC9B3E4E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3EC84E9F-53F0-43EE-BB11-66FF0C01A392", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECBEC8C6-8617-4745-8847-E676E634A37E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E7735FC0-FE8A-49FE-AD35-4A15514B2E1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "35ECAFB3-E81D-4B72-8A9F-926D4E30B2FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "0384CB13-ACA2-4219-B61A-CE472AEC42A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "762D42CE-E175-4099-99D9-C27DF4DDC96D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "B78565A2-2F03-43EC-A290-BDE534DC7142", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "9EC50185-33A4-45A0-8FCA-DEB9EDEADED3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F397C5C0-8DA9-41C9-8531-821F098AD203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3E5F2E80-52C5-431E-803E-9D91D4A48549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F890F47E-575C-47C1-9658-95A0CF6C35DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "5981CF41-2548-4323-AEE0-B1E827F346DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D7A67BB3-DFFC-4117-B01E-96F04D90F44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "551BCF57-8461-4EB9-864A-94D306CC748C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "0C804C84-5E61-4445-B7B5-435BD367836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "1A6C776A-B236-48C2-8F55-C8CC0E0B3621", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "A4B584F0-5381-407A-B087-1143BED263AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF6CEF1D-8ACB-460D-89C2-B259CBBB4A50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B9AA167-B21A-47EA-BA0A-C690548A0D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "7B261AAC-212F-4924-AEAB-088254B2A943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "841F097C-A61C-4954-9081-5F81F8AC71AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "657CF7A8-A81D-4F07-BD15-4AA056ED564C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC3D3F94-718B-40A5-8029-1F9401B1DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "AFE2F35E-AF83-47E3-8135-49DA4D059C4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB2FB07B-9EB3-45C0-B647-FF2FDEE7E0E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "E9FF6B0F-7CD2-4720-831B-9CAB2F0E3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "6E1163A0-F4AF-4A5A-9F3D-AB7148210B9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "5E62050E-83EF-4FB9-94B4-4F2F015BF876", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "8D1A84BC-B4F9-4C55-9DFE-C6F8D780BC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FFEB151-C625-4460-BB36-D0F96AC3ED39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "48C2F7ED-64A3-4451-BCA4-129B103C4563", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "045AD916-F7BD-47AF-A4F7-65220DD7A6A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0237D11B-5932-4278-85A1-804DC35C1607", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D214888-2441-41C1-B4CD-E27B7EDEC1BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3ED5C195-CBF4-4FB5-9D5D-7C7089386A58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "18BE37E3-529A-4116-BEF5-3CB64A516FC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F33CEEE-9108-40CC-85B8-B0F5EEB66E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "D60C4195-A37B-4F60-9E90-6DD683DC77EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "7EAE6495-1E91-45F3-9C77-01C8988E1D53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E037CCA1-F4A3-4ADD-B1FC-C15DE2B1FDCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1F9CA9A-1129-4EED-BC24-05C63CF120ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FF1568C6-188E-4E0F-B226-75ACB9AABA91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD63F11-5C36-46F8-9526-C842D114AB48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3CE7645F-F4A5-444D-BF6F-A3005170E6E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4FBE26B-1254-464E-A94F-1DDE40DED972", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "7CFC1CEF-54B3-44F5-9A22-6A8C414B19BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "33BB0E64-BA3F-4693-96DF-967EBB4F5D45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "F2779379-8297-4580-A38E-9EFF46E662CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E98D9E04-3F48-4ED0-9740-BB43DF730432", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AFE05035-B3A3-45DA-AA8D-B39AA1051A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "F0A8B53C-8C75-42AF-ACEF-C57B93B34A8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "FEA0573C-190D-4B22-9BBB-A715E02D3A67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "34A30151-4114-4D93-BDE5-5A6DFDFD66E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "F1412B71-4295-4C69-82C8-A8FAC4812C4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DE61C8BC-10AA-4FD3-BCD4-89B519D06CA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "D03762E2-C3D1-46AD-A319-4E9D12BF3CDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "B13317BC-3BF3-471A-AE5A-B97622B6EB84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "C9D79ED3-6D47-407A-B22A-6752C9F06168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "2D7D7C6F-9E65-4C9C-9CAF-2677D3DAB422", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "C4FBC2AD-0CC6-4C56-BE96-0A5FBCD9A3EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "75B5C3F4-D573-4FDE-A626-EE7D4449B0D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0947C0AD-DBB1-44A9-A4E9-714C030FE48A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "D7F831E4-7DD8-4840-A797-EC25BA20FC95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B41968BF-F0CF-4D0F-9E28-FF7012507248", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "073457DF-0B68-4EB4-B494-D00AD4941E7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "EB5C5C7F-E37C-4F74-9C4F-4B510D7675D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "BF442016-A3A0-4170-B90D-D51065ECF4A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EAAE48DF-0CA1-4AED-ADA4-C68193BFD30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "ADD2086B-C210-4764-B30A-53DE87A7581D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "4585B8D2-209B-4037-BC17-435429A33981", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F1E9CAC5-F2AF-44F5-8D16-D9ECBAA42023", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA06D8E8-B9D6-4D0E-9835-B9FF748D99BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DD5E5A9-35F6-49C4-8AF1-76034E7A14C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "29923F8D-10A0-419C-9971-5A6911A785E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "60681C28-C0CC-4530-B8F0-C480D990CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9588942C-49B2-4CDE-86BE-351043B8952A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "7868ECBC-3A91-4C9B-B434-A906A3E4933D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "2F1FFCEE-5733-4FA8-82FA-100CA9356C74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "39838207-BFCF-4D50-8F0D-CB1F803713DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "035D8DAD-28C8-4F17-A111-6F3A9ED0F794", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C479BF8-CB2A-4FED-B73E-37E196D7020A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "100B2F4E-52AB-4C95-A498-F264DB882FB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "2CA22313-0B4B-4A9D-BDEF-F9E973C26552", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E3AFA22-0827-422B-A000-8AECDC25C4DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "052EC44A-48DA-42BF-8122-4F538273A8A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "20E83CE0-FD4A-4020-A6C2-676EFD5A3AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "52A82461-6C35-4059-87D3-08CA394F0F73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "4699E9BA-AF1B-4821-820C-9DA874BEF387", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "16828690-DAAE-4EB8-A9D3-2A49FAAEFA5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "B4C42B43-CA61-48DD-8478-43592FFA06B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "31AD798B-D1F0-4767-960D-AE1366B09A3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AECEE3E-AC32-4260-BE9C-289B77870502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D7A9E3D5-B353-4D95-9A72-41E160759C15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3A859DE9-C63D-436A-8C4E-BE1EEE142B57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A215146-4551-4451-A386-07855B0D72B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E59E08-4822-482A-96F1-02F677B914FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "2B7562C0-549F-4886-816C-888E2FA30C74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "0C8A2029-8EE7-4B79-9B03-5B05CE3FCFB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C425B776-A41E-4B0C-AA63-30B64880205D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "CE63C747-7D82-4888-853A-13F5BC6EFFFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "31B41E13-1595-4259-9FB9-294796B82909", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "28080BE5-408C-4A1F-A7C2-3088AF52DA79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5FCC13A2-DC3A-4EE2-9009-A2B034CC5205", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8ACB3B4-9DD1-4FB3-B861-46C5D4338EB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "641D178B-8C9A-4373-8789-FE161DF8739A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFB1AD40-1B4C-407F-A1B6-99EDF5CD5856", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CAE8C11-F27B-495F-A6A7-775BD020A238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "59977D01-EE5D-4581-849D-C9C14049FFD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "E49A4D27-FA03-4C4C-B382-617F6FF3E9A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "46E1AF65-4336-4286-AC98-8B9A7ACAF1D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD49880C-A06E-43DD-9FBE-34F6E53AA05A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8D09028-B17E-4702-996D-D20F9A159873", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "46E7C7B9-E3A9-4C8C-B25C-D27017CA0921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "325F91DB-B2EC-4646-A8E8-564B1190E043", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7970E2B7-9D5B-423C-8AD8-8051C1D0873E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E6C316E6-995D-4EE9-9E89-C6A99D0999FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "292E3DA4-87C6-4FAC-996B-B01BCCC2C149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "794FC736-3712-438C-B208-32C52023CF76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C644985A-337F-4A2C-8895-CF0CC868A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_key_expansion_module_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "EBA00562-A4EC-4B41-84D4-827AAE38B8C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851_key_expansion_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AB0894B-04B2-4E6D-940F-2CCDABE962C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "68C3B91E-6440-4F33-8CF4-0A903EC08566", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "6B1CAC22-A0CE-4B13-82B6-E12C0A318D1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "080645B2-DBA1-4F6F-B72E-A5383EBE9842", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDB3DBE4-FB2D-4AF2-9964-5BA11ACAE094", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3363A0F6-D438-42E4-BB59-DE04D5A23C8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B96B5E6-787C-4AC1-8490-D6B6591A0BEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8B0C04C-AE09-4EDB-9D19-7F316261E07E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5AA9F-7156-4EF5-AFA3-84F9AEE740E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "37D3428D-F68D-4346-9FE5-3042956067A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EF666268-4180-484A-86D2-44DF7F4F8273", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3DC98996-05DC-479E-ABA8-5F076CF62678", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "C96268A7-3251-4455-A95B-07DF5D6D38DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A9953-BE93-4D3C-9EEC-0547D7F8A390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "72E33F84-55FE-4462-949A-888F0A28A06E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "51E0CC4F-7291-4F85-A2FF-E0CCC24CF3EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "F7C77029-0751-4D8D-B32E-57AE37D018DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D40D4BB-A6BC-428B-BB9E-BBD9D1560F9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1AB93FA3-06C6-4284-BFAF-F0095D67BACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4D891-6A4C-4B07-86B2-0995038477D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "C128AB7D-D91C-4C9C-9992-A43C131F41D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "2AC595D4-B946-48BC-98C5-38715A5E4719", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3394B29C-1845-41D3-A9AB-46599A2D087D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DA5D7B9-86AE-42F9-904C-91C7EDFA2792", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "53D54ACA-AB7A-476B-B8BC-3B8B20D80DA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "390D943A-C4C7-4412-9714-3EEF97A1EB7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A9E67-A782-412D-9479-043F4997D7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "1B8E10B2-C291-4D38-863A-5E6F16C19128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "DDC7EEFE-4A03-4510-845E-3ED2369B0C7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7AED7945-34E0-406D-8DB1-90E0EEFC32FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "BC8F6449-440E-46DE-9D16-70AE472E5A5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_key_expansion_module_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "3E555AFA-9E35-410F-ABEC-651A21F0B044", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861_key_expansion_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF034C01-310E-4B64-B8DC-B6054B0D26DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "24B726C0-D2D9-45FF-8EA9-1F1293BF9302", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "EA860D6B-D4B1-43E5-8ADC-F39001E49DDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C8D8C98-B8CE-421D-96EA-A6F98D3B22AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "33AF04F5-439D-4021-8DE6-0BC1ECCB9D29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "70EB545F-5773-4782-A16D-0EB78E63BDAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F7BB8-128C-4DB5-98FD-D2C38FFECF4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D7AB8752-7651-4882-8AFD-464DE6BCA85C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "C6325756-0929-48EB-867B-365E9E261A87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "3F371DF3-3786-40A6-A270-3B8CACE55D8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4939E8F9-D100-44BA-93E4-3D2110B0C45B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "0940A9D7-1ACA-4B7E-9934-2E034464A971", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "3DA1B884-2093-4A45-BC6A-60D35136FDAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "615928B2-F08D-43DA-8F98-0EB9717E86FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "41D85B75-3956-4DB6-84AB-3EC94D9B8319", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "ED1C83C6-9AD9-4DBA-B9D3-8A6866AB147F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "DD8CDF57-621D-4CE0-AE81-CA69648A448E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "ACD0F966-FF5B-4922-ABE9-70E04B293D51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "19B36C31-FF01-41AE-A287-58743F0EC1B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "34B22E1A-D8CA-4050-8E88-060BB6DEA096", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "EE476131-EA5F-451F-B499-CBDBDDBA9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "ABB71861-BF39-4253-9376-8AA8DA531471", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "22B483D7-F410-4AAD-BA82-1556BDE3709A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5038C3F1-AF13-447A-B609-85258A01FFBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "8A1D0189-6E94-4DB7-8372-39A132136A17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B5D413B0-A268-4FEC-998A-A0A36F632CBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9F9317E-DFB8-4C8C-A885-23C655F088A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "46F5F10C-F765-463F-896D-A8453F92FD83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C47A3B86-E1AA-453C-9651-188070EDFCD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0E852D82-72A8-4785-B048-A14ACEE99ED7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "3C5B9999-9921-4FB2-8DCE-6835CAFFC1CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "FB4F9FB3-6A31-4DF2-B582-B4C115767CDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11-3-1mppsr4upg:*:*:*:*:*:*:*", "matchCriteriaId": "01ED00F8-0BED-4EEB-846F-51422E085F81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11-3-1msr2upg:*:*:*:*:*:*:*", "matchCriteriaId": "D029FECC-148F-4E90-9F7D-DB7A589AD5A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9D7D6BD-9E28-49D4-836D-1A5CAC1F78E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9BA1F35-7AF6-46B1-98A1-AE2AD5237707", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "641AF1DA-4942-403D-B4A2-9AF87C176466", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C6D6A64B-C659-47BE-8B66-5BCADB33D45D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF5125D-0A04-4EB7-A7AA-1F566D286F17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.1_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "842EB3DC-A278-442F-A3A9-45F815AE1D98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.1_msr2-1:*:*:*:*:*:*:*", "matchCriteriaId": "AF2D1336-2EF7-4280-A594-EF4647C8DD1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8DAB9B94-5D57-46F8-A522-7CABB0147883", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.2_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "443D04F5-370D-4812-91CD-ECDEA64AA526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.1.2_msr3-1:*:*:*:*:*:*:*", "matchCriteriaId": "1FD6B837-5BA1-49E0-BE6B-DC344E05CE52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "57D33673-18B6-4D99-970A-BC72DB1E5909", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "065D7046-E8EE-43F6-9942-18BC65A088E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "86B059BF-F869-4C3D-848A-1CE9B96A3A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.3_msr1-1:*:*:*:*:*:*:*", "matchCriteriaId": "078CD00D-7CFB-4F2A-96B2-DB111971A0CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF27471D-9C51-40AA-A037-30808A94A400", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "32E65419-104F-467D-88CA-8800BAC94187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1_msr1-3:*:*:*:*:*:*:*", "matchCriteriaId": "F68E0B54-0508-4816-88C8-07F54526CCE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1_msr2-6:*:*:*:*:*:*:*", "matchCriteriaId": "0871D409-AF8C-40D1-8AEA-A7892791895D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.1_msr3-3:*:*:*:*:*:*:*", "matchCriteriaId": "B1FA15F7-AE16-4902-BE48-BD1C84DBD82F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "87CCB121-43BD-4A08-8C63-D7F662F6F983", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "19A339A7-4144-4C62-AEF5-7431FA61172B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.3_msr1:*:*:*:*:*:*:*", "matchCriteriaId": "D4BEC729-829D-4417-98FB-9260D77F3236", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE164423-2BBB-46E8-A491-A265302178A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F932654-D828-478F-8CD2-7789A478C906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7F4AC678-AB74-4EAF-830E-79ABD38E5930", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.6sr1:*:*:*:*:*:*:*", "matchCriteriaId": "F7DB1393-A655-4B92-BE70-9824E92E66A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7F97F322-FE43-45C6-A2BC-33BC0ACFDD52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.7sr1:*:*:*:*:*:*:*", "matchCriteriaId": "CA89E75D-674E-449B-AEE5-54CE5B6B4DCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:11.3.7sr2:*:*:*:*:*:*:*", "matchCriteriaId": "7B61A939-4E74-496A-8D33-AE42B4602203", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition." } ], "id": "CVE-2023-20221", "lastModified": "2024-11-21T07:40:55.780", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-16T22:15:11.687", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-05 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C412D40-7E0A-4FF1-9D07-21117B915509", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A2F31BA-AF80-4C21-9FD0-A0DB1D304024", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158B805-6515-4DC3-AB76-1D2F7036492F", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8096985-5813-4098-BF38-FD09CB2ACBFA", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "327BB99F-F398-49C3-83A2-DE8392F13A51", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1021FD6B-50A7-40E1-8081-F7BD80777E75", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CEB6D52-F968-4D81-A0E0-F9E81CCBF1AF", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*", "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E38A06CF-5C29-47EA-8E63-45DED1085864", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F94AED70-743C-4764-A342-5503649852CF", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*", "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80C0B9B7-C7F6-4FF8-9CDD-F823516C0F31", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A4A4B0F-3A7C-4EE9-A6ED-4C1E1C4AAD57", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE05ACF-E50D-478A-B24D-5DFDADAC14C1", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DB7E94-661F-4447-9338-1BCB46CCE665", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F3968E7-EFA1-42FF-B62B-8D76B1F9AE70", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF864D9-B587-4FCE-BEB2-9A1EC49DF8F7", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CEB9EC-D645-4EFE-AAC3-8EAB120B654F", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "801FD445-7410-457C-98CC-F839427CEBD4", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21B5DDF7-4B8D-4E26-B816-1981F29B35AA", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BE38659-4111-4D7D-8B6C-54B7D28EE5A9", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C25A9EF-0963-4BEA-9183-B21CA2871C03", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F64960C-05A6-4150-9307-8890F617B077", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1498AAB-2129-48F0-9985-60667F4484E4", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D85F9FDA-AA2E-4E40-A4C0-086ABA8CC238", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDC48168-00E4-44F4-82A0-AB3A3F12E934", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6487419F-6DC3-4606-87B3-B429314E00D4", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13C4E4FC-0B10-4447-8EF6-9D82C833DA20", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31CC8824-E700-4D80-9F96-5076D4DA7816", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A8762CE-FDC4-4C8B-BA64-8867711CDB46", "versionEndExcluding": "12.7\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECD950B5-786D-4C9C-BB33-3F9DF41891F6", "versionEndExcluding": "11.3\\(1\\)sr1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9495099-FC90-46E7-8B86-1BC8B9B055B5", "versionEndExcluding": "10.3\\(1\\)sr6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "660475FD-8475-4968-9ED2-D83461B9A5D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_for_third-party_call_control_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5699693-DBEC-429F-B67E-0B1625818FAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831_for_third-party_call_control:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7AA843-E37E-42A0-BD4C-9710BDD50D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B20E2DFB-CBEB-4A0A-B099-3D5C7A973EC9", "versionEndExcluding": "11.0\\(5\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A40EB66A-AEA5-449A-B025-996882A25DC9", "versionEndExcluding": "11.0\\(5\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)." }, { "lang": "es", "value": "Una vulnerabilidad en la implementaci\u00f3n de Cisco Discovery Protocol para Cisco IP Phone, podr\u00eda permitir a un atacante adyacente no autenticado ejecutar c\u00f3digo remotamente con privilegios root o causar una recarga de un tel\u00e9fono IP afectado. La vulnerabilidad es debido a una falta de comprobaciones cuando se procesan los mensajes de Cisco Discovery Protocol. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete de Cisco Discovery Protocol dise\u00f1ado hacia el tel\u00e9fono IP apuntado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo remotamente con privilegios root o provocar una recarga de un tel\u00e9fono IP afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Cisco Discovery Protocol es un protocolo de Capa 2. Para explotar esta vulnerabilidad, un atacante debe encontrarse en el mismo dominio de difusi\u00f3n que el dispositivo afectado (Capa 2 adyacente)." } ], "id": "CVE-2020-3111", "lastModified": "2024-11-21T05:30:20.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-05T18:15:10.783", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-14 05:15
Modified
2024-11-21 06:43
Severity ?
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html | Exploit, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://seclists.org/fulldisclosure/2022/Jan/34 | Mailing List, Third Party Advisory | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2022/Jan/34 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42261E2-07EC-416E-A65C-7D85584DED32", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*", "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B9BC28D-0BC0-45CB-A87B-59F407F3A210", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38F67250-E4D0-48BE-928E-EF1BB4005940", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD40B5EB-D356-42D4-9464-67D0481460A9", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67895EA8-C707-4228-A8A2-4654E2B912CA", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F83ED1C8-1655-46EC-B1F5-4BD1D519057D", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41F875DA-AF0C-49CE-8BC5-DD1E0702FACF", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFACDCE6-95B3-45A7-86D3-18F3A78D5AF7", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "280BC438-AF6B-464B-A283-CE183C06E13B", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64E92C6B-5BA7-4C5F-B262-AE20F3951923", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E3B94C-BA7B-481A-AF4D-2FCF5E81D7B6", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9A7F857-A3D7-43DA-8E94-FDA0EE542C39", "versionEndExcluding": "14.1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22846195-008E-4D1B-A0C3-3364B141EC5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*", "matchCriteriaId": "660475FD-8475-4968-9ED2-D83461B9A5D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_for_third-party_call_control_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5699693-DBEC-429F-B67E-0B1625818FAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831_for_third-party_call_control:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7AA843-E37E-42A0-BD4C-9710BDD50D9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7945g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "361613B3-A977-4E2A-8D41-EDE85F1D9623", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5980E646-CA07-4222-A9DD-A71306A4A678", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7965g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F52E0123-63EF-40FB-85B7-2C2838CBF3BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF30D1CC-D27F-49FF-9C63-BB890002D1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_7975g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "415AE68B-E623-4B95-89CA-1F3C2C96A33C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA879B6-04D6-402A-8F38-8A7CB34D76F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_sip_phone_3905_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1B36FBC-7879-4AE5-8D28-2A5BE8C88356", "versionEndExcluding": "9.4\\(1\\)sr5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_sip_phone_3905:-:*:*:*:*:*:*:*", "matchCriteriaId": "14E1313A-F2D4-4F40-BC50-2D1BA2BBB4C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A19DB2-1E3A-40AC-B265-878E9B568E8C", "versionEndExcluding": "11.0\\(6\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "039BF626-1168-44E3-90E4-0C2BE311FA3E", "versionEndExcluding": "11.0\\(6\\)sr2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks." }, { "lang": "es", "value": "Una vulnerabilidad en la arquitectura de almacenamiento de informaci\u00f3n de varios modelos de tel\u00e9fonos IP de Cisco podr\u00eda permitir a un atacante f\u00edsico no autenticado obtener informaci\u00f3n confidencial de un dispositivo afectado. Esta vulnerabilidad es debido al almacenamiento no cifrado de informaci\u00f3n confidencial en un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad al extraer f\u00edsicamente y acceder a uno de los chips de memoria flash. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener informaci\u00f3n confidencial del dispositivo, que podr\u00eda ser usada para ataques posteriores" } ], "id": "CVE-2022-20660", "lastModified": "2024-11-21T06:43:15.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-14T05:15:11.083", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jan/34" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jan/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }